Escape Plans: A Year's Journey with Microsoft Edge Sandbox
|
MJ0011
,
Yuki Chen
|
New Reliable Android Kernel Root Exploitation
|
Xpl017Elz
|
White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphone OS and Apps
|
Shinjo Park
|
Hacking Phones from 2013 to 2016
|
|
Flip Feng Shui: Hammering a Needle in the Software Stack
|
Ben Gras
|
Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-Driving Vehicles”
|
Chen Yan
,
Wenyuan Xu
,
Jianhao Liu
|
The Great Train Cyber Robbery
|
Gleb Gritsai
,
Sergey Gordeychik
|
Exploiting PHP-7: teaching a new dog old tricks
|
Yannay Livneh
|
Cyber Grand Shellphish: Shellphish and the DARPA Cyber Grand Challenge
|
Kevin Borgolte
|
The Million-Key Question – How RSA Public Key Leaks Its Origin
|
Petr Švenda
,
Peter Sekan
|
Scaling to the Adversary: Machine Learning Driven Mining of Threat Intel from the Darkweb
|
Paulo Shakarian
|
Forcing LTE Cellphone into Unsafe Network
|
Wanqiao Zhang
,
Lin Huang
|
badWPAD
|
Maxim Goncharov
|
Effective Patch Analysis for Microsoft Updates
|
Brian Pak(Cai)
|
Analysis of iOS 9.3.3 Jailbreak & Security Enhancements of iOS 10
|
|
Papa Said They Used To Find Vulnerabilities Manually...
|
Su Yong Kim
|
qemu+kvm & xen pwn: virtual machine escape from 'Dark Portal'
|
Wei Xiao
,
Qinghao Tang
|