Star 0

Talks

Title Humans
What Got Us Here Wont Get Us There Haroon Meer , Thinkst
Unboxing the White-Box: Practical Attacks Against Obfuscated Ciphers Eloi Sanfelix , Job de Haas , Cristofaro Mune , Riscure
How to Break XML Encryption - Automatically Juraj Somorovsky , 3curity / Ruhr University Bochum
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken , Coverity
Exploiting Adobe Flash Player in the Era of Control Flow Guard Francisco Falcon , Core Security
Vulnerability Exploitation in Docker Container Environments Anthony Bettini , FlawCheck
Panel: What You Need to Know About the Changing Regulatory Landscape in Information Security Vincenzo Iozzo , Dr. Richard Tynan , Halvar Flake , Paul Timmers , Marietje Schaake , Rakoku Holdings , Privacy International , European Commission, DG CONNECT, Directorate H "Digital Society, Trust & Security" , European Parliament
New (and Newly-Changed) Fully Qualified Domain Names: A View of Worldwide Changes to the Internets DNS Paul Vixie , Farsight Security Inc.
Your Scripts in My Page - What Could Possibly Go Wrong? Ben Stock , Martin Johns , Sebastian Lekies , University of Erlangen-Nuremberg , SAP , University of Bochum
Hiding in Plain Sight - Advances in Malware Covert Communication Channels Pierre-Marc Bureau , Christian Dietrich , Dell SecureWorks , CrowdStrike, Inc.
Hey Man Have You Forgotten to Initialize Your Memory? Yuki Chen , Linan Hao , Qihoo 360
Lessons from Defending the Indefensible Marek Majkowski , CloudFlare
Bypassing Self-Encrypting Drives (SED) in Enterprise Environments Daniel Boteanu , Kevvie Fowler , KPMG LLP
Self-Driving and Connected Cars: Fooling Sensors and Tracking Drivers Jonathan Petit , Security Innovation
A Peek Under the Blue Coat Raphael Rigo , Airbus Group Innovations
Cybercrime in the Deep Web Marco Balduzzi , Vincenzo Ciancaglini , Trend Micro Research
Even the LastPass Will be Stolen Deal with It! Alberto Garcia , Martin Vigo , Salesforce.com
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A , Cisco Systems
Going AUTH the Rails on a Crazy Train Jeff Jarmoc , Tomek Rabczak , NCC Group
Implementing Practical Electrical Glitching Attacks Brett Giller , NCC Group
Is Your TimeSpace Safe? - Time and Position Spoofing Opensourcely Wang Kang , Shuhua Chen , Aimin Pan , Mobile Security of Alibaba Group , Mobile Security of Alibaba
Cybersecurity for Oil and Gas Industries: How Hackers Can Manipulate Oil Stocks Alexander Polyakov , Mathieu Geli , ERPScan
Silently Breaking ASLR in the Cloud Antonio Barresi , Kaveh Razavi , Mathias Payer , Thomas Gross , xorlab , VU University Amsterdam , Purdue University , ETH Zurich
Watching the Watchdog: Protecting Kerberos Authentication with Network Monitoring Tal Be'ery , Michael Cherny , Microsoft Corporation
Authenticator Leakage through Backup Channels on Android Guangdong Bai , National University of Singapore
Defending Against Malicious Application Compatibility Shims Sean Pierce , iSIGHT Partners
VoIP Wars: Destroying Jar Jar Lync Fatih Ozavci , Sense of Security Pty Ltd
Attacking the XNU Kernel in El Capitain Luca Todesco
All Your Root Checks Belong to Us: The Sad State of Root Detection Azzedine Benameur , Nathan Evans , Yun Shen , Symantec Research Lab
Triaging Crashes with Backward Taint Analysis for ARM Architecture Dongwoo Kim , Sangwho Kim , Chungnam National University
Fuzzing Android: A Recipe for Uncovering Vulnerabilities Inside System Components in Android Alexandru Blanda , Intel Corporation
(In-)Security of Backend-As-A-Service Siegfried Rasthofer , Steven Arzt , TU Darmstadt / CASED
AndroBugs Framework: An Android Application Security Vulnerability Scanner Yu-Cheng Lin , MediaTek
Faux Disk Encryption: Realities of Secure Storage on Mobile Devices Daniel Mayer , Drew Suarez , NCC Group
Breaking Access Controls with BLEKey Eric Evenchick , Mark Baseggio , Faraday Future , Optiv
Stegosploit - Exploit Delivery with Steganography and Polyglots Saumil Shah , Net-Square
Continuous Intrusion: Why CI tools are an Attackers Best Friends Nikhil Mittal
Commix: Detecting and Exploiting Command Injection Flaws Anastasios Stasinopoulos , Christoforos Ntantogian , Christos Xenakis , Department of Digital Systems, University of Piraeus
New Tool for Discovering Flash Player 0-day Attacks in the Wild from Various Channels Peter Pi , Trend Micro, Inc.
Locknote: Conclusions and Key Takeaways from Black Hat Europe 2015 Jeff Moss , Marion Marschalek , Haroon Meer , Jennifer Savage , U.S. Department of Homeland Security Advisory Council , Cyphort, Inc. , Thinkst
LTE & IMSI Catcher Myths Ravishankar Borgaonkar , Altaf Shaik , N. Asokan , Valtteri Niemi , Jean-Pierre Seifert , Aalto University , TU Berlin , University of Helsinki , University of Turku, Finland , TU Berlin and T-Labs