Mess with the best, die like the rest (mode)
|
Volodymyr Pikhur
|
Reverse Engineering Windows Defender’s JavaScript Engine
|
Alexei Bulazel
|
Hacking Toshiba Laptops
|
Michał Kowalczyk
,
Serge Bazanski
|
Robin Hood vs Cisco ASA AnyConnect
|
Cedric Halbronn
|
Subverting your server through its BMC: the HPE iLO4 case
|
Alexandre Gazet
,
Joffrey Czarny
,
Fabien Perigaud
|
Starcraft: Emulating a buffer overflow for fun and profit
|
Elias Bachaalany
|
Visiting The Snake Nest
|
Matthieu Faou
,
Jean-Ian Boutin
|
Linux Vulnerabilities, Windows Exploits: Escalating Privileges with WSL
|
Saar Amar
|
Decompiler internals: microcode
|
Ilfak Guilfanov
|
TBD
|
Anonymous
|
Dissecting QNX
|
Ali Abbasi
,
Jos Wetzels
|
Neurosurgery for Industrial Routers: Security of Sarian OS
|
Danila Parnishchev
|
DIY ARM Debugger for Wi-Fi Chips
|
Matthias Schulz
|
When Virtual Hell Freezes Over - Reversing C++ Code
|
Gal Zaban
|
Breaking state-of-the-art binary code obfuscation
|
Tim Blazytko
,
Moritz Contag
|
Reversing IoT: Xiaomi ecosystem
|
Dennis Giese
,
Daniel Wegemer
|