Perf Vs Security: The Virtio Security in Qemu
|
Qiang Li
,
Zhibin Hu
|
Pwned in Translation - from Subtitles to RCE
|
Omri Herscovici
,
Omer Gull
|
Let Math be The Beacon of Your Vulnerability Discovery
|
Lei Shi
,
Mei Wang
|
Enhancing Symbolic Fuzzing with Learning
|
Li Kang
|
Towards Mitigating Arbitrary Native Code Execution in Windows 10
|
Matt Miller
|
Helium, Argon & Xenon: The Noble Gases of Windows Containers
|
Alex Ionescu
|
A Story of Exploiting macOS Sierra Kernel
|
Team Pangu
|
Glibc vulnerability CVE-2015-7547 and Google
|
Fermin J. Serna
|
Exploit iOS 9.x Userland with LLDB JIT
|
Wei Wang
|
Protecting bare-metal smart devices with EPOXY
|
Mathias Payer
|
Butterfly Effect and Program Mistake- Exploit an Unexploitable Chrome Bug
|
Guang Gong
|
Nation-State Capabilities, Lone Wolf Budget
|
Joe FitzPatrick
|
Moniker Magic: Running Scripts Directly in Microsoft Office
|
Haifei Li
,
Bing Sun
|
The wounded android WIFI driver New attack surface in cfg80211
|
Hao Chen
|
Exploring Your System Deeper is Not Naughty
|
Oleksandr Bazhaniuk
,
Yuriy Bulygin
|