Star 0

Talks

Title Humans
BinCAT: purrfecting binary static analysis Philippe Biondi , Xavier Mehrenberger , Raphaël Rigo , Sarah Zennou
Hacking Cell Phone Embedded Systems Keegan Ryan
BASS Automated Signature Synthesizer Mariano Graziano , Jonas Zaddach
You can run, but you can’t hide Vlad Sabaka
HDI PCB Netlist Recovery: a new (old) technique David Carne
MazeWalker - Enriching static malware analysis Yevgeniy Kulakov
Exporting IDA Debug Information Adam Schwalm
SGX Enclave programming: common mistakes Michael Atlas
The Life-Changing Magic of IDAPython: Embedded Device Edition Maddie Stone
Digging Into the Core of Boot Yuriy Bulygin , Oleksandr Bazhaniuk
Coverage Guided Kernel Fuzzing Richard Johnson
APT3 Uncovered - The code evolution of Pirpi Micah Yates
The HyperV Architecture and its Memory Manager Andrea Allievi
ZapZap! bangBang! Ang Cui , Rick Housley
FreeCalypso: a fully liberated GSM baseband Mychaela Falconia
Fun with Sam: Inside the Surface Aggregator Module Alex Ionescu
Bubble Struggle - Call Graph Visualization with Radare2 Marion Marschalek
Miasm: reverse engineering framework Fabrice Desclaux , Camille Mougey
Reverse Engineering DSSS Michael Ossmann
The Lightbulb Worm - A Debriefing on Philips Hue Attacks Colin O’Flynn , Eyal Ronen
Bochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking Mateusz “j00ru” Jurczyk
Crypton - Exposing malware’s deepest secrets Julia karpin , Anna Dorfman