Star 0

Talks

Title Humans
Perf Vs Security: The Virtio Security in Qemu Qiang Li , Zhibin Hu
Pwned in Translation - from Subtitles to RCE Omri Herscovici , Omer Gull
Let Math be The Beacon of Your Vulnerability Discovery Lei Shi , Mei Wang
Enhancing Symbolic Fuzzing with Learning Li Kang
Towards Mitigating Arbitrary Native Code Execution in Windows 10 Matt Miller
Helium, Argon & Xenon: The Noble Gases of Windows Containers Alex Ionescu
A Story of Exploiting macOS Sierra Kernel Team Pangu
Glibc vulnerability CVE-2015-7547 and Google Fermin J. Serna
Exploit iOS 9.x Userland with LLDB JIT Wei Wang
Protecting bare-metal smart devices with EPOXY Mathias Payer
Butterfly Effect and Program Mistake- Exploit an Unexploitable Chrome Bug Guang Gong
Nation-State Capabilities, Lone Wolf Budget Joe FitzPatrick
Moniker Magic: Running Scripts Directly in Microsoft Office Haifei Li , Bing Sun
The wounded android WIFI driver ­ New attack surface in cfg80211 Hao Chen
Exploring Your System Deeper is Not Naughty Oleksandr Bazhaniuk , Yuriy Bulygin