The android vulnerability discovery in SoC
|
Yu Pan
,
Yang Dai
,
Ye Zhou
|
Fuzzing AOSP for the Masses
|
Dan Austin
|
Exposing Vulnerabilities in Deep Learning Frameworks
|
Kang Li
|
Javascript Fuzzing
|
Jeonghoon Shin
|
An awesome toolkit for testing the virtualization system
|
Qinghao Tang
|
MMU Magic in JavaScript: Breaking ASLR from a Sandbox
|
Ben Gras
|
1-Day Browser and Kernel Exploitation
|
Andrew Wesie
|
Playing with IE11 ActiveX 0days
|
James Lee
|
From Zer0 to Persistence: A Complete Exploit Chain against Samsung Galaxy
|
Jeff Chao
|
Deluge – How to generate 2TB/s reflection DDoS data flow via a family network
|
Shengbao Cai
,
Zhang Lu
,
Li Fu
|
7 sins of ATM protection against logical attacks
|
Tim Yunusov
,
Yar Babin
|
We Can Wipe Your Email!!
|
Ilya Nesterov
,
Max Goncharov
|
Tampering with Encrypted Memory Blocks of Trusted Execution Environment
|
Yeongjin Jang
|
Make LoadLibrary Great Again
|
Yunhai Zhang
|
A Hacking and Security Story from Post iOS 10 to 11
|
Liang Chen
|
Hacking Robots Before Skynet
|
Lucas Apa
,
Cesar Cerrudo
|
Hack your body, one implant at a time
|
Patrick Paumen
|
FruitFly & Friends
|
Patrick Wardle
|
How to cook Cisco. The exploit development for Cisco IOS
|
George Nosenko
|
Hybrid App Security:Attack and defense
|
HuiYu Wu
|