Star 0

Talks

Title Humans
Escape Plans: A Year's Journey with Microsoft Edge Sandbox MJ0011 , Yuki Chen
New Reliable Android Kernel Root Exploitation Xpl017Elz
White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphone OS and Apps Shinjo Park
Hacking Phones from 2013 to 2016
Flip Feng Shui: Hammering a Needle in the Software Stack Ben Gras
Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-Driving Vehicles” Chen Yan , Wenyuan Xu , Jianhao Liu
The Great Train Cyber Robbery Gleb Gritsai , Sergey Gordeychik
Exploiting PHP-7: teaching a new dog old tricks Yannay Livneh
Cyber Grand Shellphish: Shellphish and the DARPA Cyber Grand Challenge Kevin Borgolte
The Million-Key Question – How RSA Public Key Leaks Its Origin Petr Švenda , Peter Sekan
Scaling to the Adversary: Machine Learning Driven Mining of Threat Intel from the Darkweb Paulo Shakarian
Forcing LTE Cellphone into Unsafe Network Wanqiao Zhang , Lin Huang
badWPAD Maxim Goncharov
Effective Patch Analysis for Microsoft Updates Brian Pak(Cai)
Analysis of iOS 9.3.3 Jailbreak & Security Enhancements of iOS 10
Papa Said They Used To Find Vulnerabilities Manually... Su Yong Kim
qemu+kvm & xen pwn: virtual machine escape from 'Dark Portal' Wei Xiao , Qinghao Tang