Don't Trust Your Eye: Apple Graphics Is Compromised!
|
Marco Grassi
,
Liang Chen
,
Qidan He
|
Docker Escape Technology
|
Shengping Wang
,
Qihoo 360 Marvel Team
|
Hardsploit project : All-In-One Tool for Hardware Security Audit
|
|
Automatic Binary Constraint Solving: Automatic Exploit Generation
|
Sophia D'Antoine
,
Trail of Bits
|
Virtualization device emulator testing technology
|
Qinghao Tang
,
Qihoo 360 Marvel Team
|
Sandbox Escape with Generous Help from Security Software
|
Chuanda Ding
,
Tencent Security Xuanwu Lab
|
APT Reports and OPSEC Evolution: These are not the APT reports you are looking for
|
Gadi Evron
,
Cymmetria
|
WAVE YOUR FALSE FLAGS! - Deception Tactics Muddying Attribution in Targeted Attacks
|
Kaspersky Lab
|
Bypassing Different Defense Schemes via Crash Resistant Probing of Address Space
|
Robert Gawlik
,
Ruhr University Bochum
|
Having fun with
|
Positive Technologies
|
Pwn a Nexus device with a single vulnerability
|
Guang Gong
,
Qihoo 360
|
Let's Talk about WiFi
|
|
Smart Wars: Attacking Smart Locks with a Smart Phone
|
|
Execute My Packet (Exodus of Shells from a Firewall)
|
Exodus Intelligence
|
BadWinmail and Email Security
|
Haifei Li
,
Chong Xu
,
Intel Security
|
Exploits, 0days, and Bug Bounties
|
Nicolas Joly
,
Microsoft Corporation
|
High Performance Zero Knowledge Binary Hooking and Tracing with ROP Hooks - with A-Trace (Eh-Trace)
|
IOActive, Inc.
|
Getting Physical: Extreme abuse of Intel based Paging Systems
|
Nicolas Economou
|
Attack and defense toolkits in High/Low frequency
|
Haoqi Shan
,
Qing Yang
|
Bypassing application whitelisting in critical infrastructures
|
|