OSX XPC Revisited - 3rd Party Application Flaws
|
Tyler Bohan
,
Cisco Talos vulnerability research team
|
REVERSING WITHOUT REVERSING
|
CrowdStrike, Inc.
|
Attacking Hardware Root of Trust from UEFI Firmware
|
Alex Matrosov
,
NVIDIA
|
Attack Surface of a Connected Vehicle
|
Minrui Yan
,
SkyGo Team at 360 Technology
|
iOS Dual Booting Demystified
|
Max Bazaliy
,
the National Technical University of Ukraine
|
macOS: How to Gain Root with CVE-2018-4193 in < 10s
|
|
Coverage-Guided USB Fuzzing with Syzkaller
|
Google Inc.
|
Bypass Windows Exploit Guard ASR
|
|
Updated Analysis of PatchGuard on Windows RS4: Is the Mouse Finally Caught?
|
|
Attacking Edge Through the JavaScript Just-In-Time compiler by?Bruno Keith
|
|
Reverse Engineering of Error-Correcting Codes
|
|
FuzzIL: Guided Fuzzing for JavaScript Engines
|
Samuel Gro
|
3D ACCELERATED EXPLOITATION
|
MWR InfoSecurity
|
Growing Hypervisor 0day with Hyperseed
|
Shawn Denbow
,
Daniel King
,
Microsoft Security Response Center (MSRC)
|
Modern Source Fuzzing
|
Ned Williamson
|
Glitch in the Matrix: Exploiting Bitcoin Hardware Wallets
|
Sergei Volokitin
,
Riscure in the Netherlands
|
IPC You Outside the Sandbox: One bug to Rule the Chrome Broker
|
Niklas Baumstark
|
Bugs so Nice they Patched them Twice! A (Continuing)? Story About Failed Patches
|
Jasiel Spelman
,
Abdul-Aziz Hariri
,
Brian Gorenc
,
Trend Micro's Zero Day Initiative
,
Trend Micro, Inc.
|