Exploiting 64-bit IE on Windows 8.1 – The Pwn2Own Case Study
|
|
DDoS mitigation EPIC FAIL collection
|
Moshe Zioni
|
A Trek to the Emerald City: Ring -1 Based AV
|
|
Jtagsploitation: 5 wires, 5 ways to root
|
|
Responsible disclosure: who cares?
|
|
Software Defined Networking (SDN) Security
|
David Jorm
|
Smart Muttering; a story and toolset for smart meter platform
|
Ian de Villiers
|
How to drive a malware analyst crazy
|
Michael Boman
|
Inside Terracotta VPN
|
|
Playing with Fire: Attacking the FireEye MPS
|
Felix Wilhelm
|
Hunting Asynchronous Vulnerabilities
|
James Kettle
|
Old Dog, New Tricks: Forensics With PowerShell
|
Jared Atkinson
|
Meterpreter: Understanding the New Shiny
|
|
Get in the Ring0 – Understanding Windows drivers
|
Graham Sutherland
|
reverse reverse engineering
|
Richo Healey
|
Dark Fairytales from a Phisherman (Vol.II)
|
Michele Orru
|
MITMf: Bringing Man-In-The-Middle attacks to the 21’st century
|
|
15-Minute Linux Incident Response Live Analysis
|
|
Barbarians At The Gate(way): An Examination Of The Attacker’s Tool Box
|
|
Hackers in the Wire and Drones Oh My!
|
|
Windows 10: 2 Steps Forward, 1 Step Back
|
James Forshaw
|
Reverse engineering and exploiting font rasterizers: the OpenType saga
|
Mateusz Jurczyk
|
Going AUTH the Rails on a Crazy Train
|
|
Attacking VxWorks: from Stone Age to Interstellar
|
|
Stegosploit – Drive-by Browser Exploits using only Images
|
Saumil Shah
|
Is there an EFI monster inside your apple?
|
Pedro Vilaça
|
Forging the USB armory
|
Andrea Barisani
|