Star 0

Talks

Title Humans
Don't Trust Your Eye: Apple Graphics Is Compromised! Marco Grassi , Liang Chen , Qidan He
Docker Escape Technology Shengping Wang , Qihoo 360 Marvel Team
Hardsploit project : All-In-One Tool for Hardware Security Audit
Automatic Binary Constraint Solving: Automatic Exploit Generation Sophia D'Antoine , Trail of Bits
Virtualization device emulator testing technology Qinghao Tang , Qihoo 360 Marvel Team
Sandbox Escape with Generous Help from Security Software Chuanda Ding , Tencent Security Xuanwu Lab
APT Reports and OPSEC Evolution: These are not the APT reports you are looking for Gadi Evron , Cymmetria
WAVE YOUR FALSE FLAGS! - Deception Tactics Muddying Attribution in Targeted Attacks Kaspersky Lab
Bypassing Different Defense Schemes via Crash Resistant Probing of Address Space Robert Gawlik , Ruhr University Bochum
Having fun with Positive Technologies
Pwn a Nexus device with a single vulnerability Guang Gong , Qihoo 360
Let's Talk about WiFi
Smart Wars: Attacking Smart Locks with a Smart Phone
Execute My Packet (Exodus of Shells from a Firewall) Exodus Intelligence
BadWinmail and Email Security Haifei Li , Chong Xu , Intel Security
Exploits, 0days, and Bug Bounties Nicolas Joly , Microsoft Corporation
High Performance Zero Knowledge Binary Hooking and Tracing with ROP Hooks - with A-Trace (Eh-Trace) IOActive, Inc.
Getting Physical: Extreme abuse of Intel based Paging Systems Nicolas Economou
Attack and defense toolkits in High/Low frequency Haoqi Shan , Qing Yang
Bypassing application whitelisting in critical infrastructures