What Got Us Here Wont Get Us There
|
Haroon Meer
,
Thinkst
|
Unboxing the White-Box: Practical Attacks Against Obfuscated Ciphers
|
Eloi Sanfelix
,
Job de Haas
,
Cristofaro Mune
,
Riscure
|
How to Break XML Encryption - Automatically
|
Juraj Somorovsky
,
3curity / Ruhr University Bochum
|
Bypassing Local Windows Authentication to Defeat Full Disk Encryption
|
Ian Haken
,
Coverity
|
Exploiting Adobe Flash Player in the Era of Control Flow Guard
|
Francisco Falcon
,
Core Security
|
Vulnerability Exploitation in Docker Container Environments
|
Anthony Bettini
,
FlawCheck
|
Panel: What You Need to Know About the Changing Regulatory Landscape in Information Security
|
Vincenzo Iozzo
,
Dr. Richard Tynan
,
Halvar Flake
,
Paul Timmers
,
Marietje Schaake
,
Rakoku Holdings
,
Privacy International
,
European Commission, DG CONNECT, Directorate H "Digital Society, Trust & Security"
,
European Parliament
|
New (and Newly-Changed) Fully Qualified Domain Names: A View of Worldwide Changes to the Internets DNS
|
Paul Vixie
,
Farsight Security Inc.
|
Your Scripts in My Page - What Could Possibly Go Wrong?
|
Ben Stock
,
Martin Johns
,
Sebastian Lekies
,
University of Erlangen-Nuremberg
,
SAP
,
University of Bochum
|
Hiding in Plain Sight - Advances in Malware Covert Communication Channels
|
Pierre-Marc Bureau
,
Christian Dietrich
,
Dell SecureWorks
,
CrowdStrike, Inc.
|
Hey Man Have You Forgotten to Initialize Your Memory?
|
Yuki Chen
,
Linan Hao
,
Qihoo 360
|
Lessons from Defending the Indefensible
|
Marek Majkowski
,
CloudFlare
|
Bypassing Self-Encrypting Drives (SED) in Enterprise Environments
|
Daniel Boteanu
,
Kevvie Fowler
,
KPMG LLP
|
Self-Driving and Connected Cars: Fooling Sensors and Tracking Drivers
|
Jonathan Petit
,
Security Innovation
|
A Peek Under the Blue Coat
|
Raphael Rigo
,
Airbus Group Innovations
|
Cybercrime in the Deep Web
|
Marco Balduzzi
,
Vincenzo Ciancaglini
,
Trend Micro Research
|
Even the LastPass Will be Stolen Deal with It!
|
Alberto Garcia
,
Martin Vigo
,
Salesforce.com
|
Automating Linux Malware Analysis Using Limon Sandbox
|
Monnappa K A
,
Cisco Systems
|
Going AUTH the Rails on a Crazy Train
|
Jeff Jarmoc
,
Tomek Rabczak
,
NCC Group
|
Implementing Practical Electrical Glitching Attacks
|
Brett Giller
,
NCC Group
|
Is Your TimeSpace Safe? - Time and Position Spoofing Opensourcely
|
Wang Kang
,
Shuhua Chen
,
Aimin Pan
,
Mobile Security of Alibaba Group
,
Mobile Security of Alibaba
|
Cybersecurity for Oil and Gas Industries: How Hackers Can Manipulate Oil Stocks
|
Alexander Polyakov
,
Mathieu Geli
,
ERPScan
|
Silently Breaking ASLR in the Cloud
|
Antonio Barresi
,
Kaveh Razavi
,
Mathias Payer
,
Thomas Gross
,
xorlab
,
VU University Amsterdam
,
Purdue University
,
ETH Zurich
|
Watching the Watchdog: Protecting Kerberos Authentication with Network Monitoring
|
Tal Be'ery
,
Michael Cherny
,
Microsoft Corporation
|
Authenticator Leakage through Backup Channels on Android
|
Guangdong Bai
,
National University of Singapore
|
Defending Against Malicious Application Compatibility Shims
|
Sean Pierce
,
iSIGHT Partners
|
VoIP Wars: Destroying Jar Jar Lync
|
Fatih Ozavci
,
Sense of Security Pty Ltd
|
Attacking the XNU Kernel in El Capitain
|
Luca Todesco
|
All Your Root Checks Belong to Us: The Sad State of Root Detection
|
Azzedine Benameur
,
Nathan Evans
,
Yun Shen
,
Symantec Research Lab
|
Triaging Crashes with Backward Taint Analysis for ARM Architecture
|
Dongwoo Kim
,
Sangwho Kim
,
Chungnam National University
|
Fuzzing Android: A Recipe for Uncovering Vulnerabilities Inside System Components in Android
|
Alexandru Blanda
,
Intel Corporation
|
(In-)Security of Backend-As-A-Service
|
Siegfried Rasthofer
,
Steven Arzt
,
TU Darmstadt / CASED
|
AndroBugs Framework: An Android Application Security Vulnerability Scanner
|
Yu-Cheng Lin
,
MediaTek
|
Faux Disk Encryption: Realities of Secure Storage on Mobile Devices
|
Daniel Mayer
,
Drew Suarez
,
NCC Group
|
Breaking Access Controls with BLEKey
|
Eric Evenchick
,
Mark Baseggio
,
Faraday Future
,
Optiv
|
Stegosploit - Exploit Delivery with Steganography and Polyglots
|
Saumil Shah
,
Net-Square
|
Continuous Intrusion: Why CI tools are an Attackers Best Friends
|
Nikhil Mittal
|
Commix: Detecting and Exploiting Command Injection Flaws
|
Anastasios Stasinopoulos
,
Christoforos Ntantogian
,
Christos Xenakis
,
Department of Digital Systems, University of Piraeus
|
New Tool for Discovering Flash Player 0-day Attacks in the Wild from Various Channels
|
Peter Pi
,
Trend Micro, Inc.
|
Locknote: Conclusions and Key Takeaways from Black Hat Europe 2015
|
Jeff Moss
,
Marion Marschalek
,
Haroon Meer
,
Jennifer Savage
,
U.S. Department of Homeland Security Advisory Council
,
Cyphort, Inc.
,
Thinkst
|
LTE & IMSI Catcher Myths
|
Ravishankar Borgaonkar
,
Altaf Shaik
,
N. Asokan
,
Valtteri Niemi
,
Jean-Pierre Seifert
,
Aalto University
,
TU Berlin
,
University of Helsinki
,
University of Turku, Finland
,
TU Berlin and T-Labs
|