Analysis of iOS 9.3.3 Jailbreak & Security Enhancements of iOS 10
|
Team Pangu
|
Demystifying the Secure Enclave Processor
|
Mathew Solnik
|
Application of Machine Learning in Threat Intelligence Data Mining
|
Ashley Zhao
|
BadKernel —--- exploit V8 with a typo
|
Deng Yuan
,
Guang Gong
|
Running Code in the TrustZone Land
|
Edgar Barbosa
|
Strategies on Securing you banks & enterprises. (From someone who robs banks & enterprises)
|
Jayson E. Street
|
“Cosa Nostra” an open-source malware clusterization toolkit
|
Joxean Koret
|
Look Mom! I Don’t Use Shellcode: A Browser Exploitation Case Study for Internet Explorer 11
|
Moritz Jodeit
|
Browser Bug Hunting and Mobile
|
Francisco Alonso
,
Jaime Penalba
|
Escape Plans: A Year’s Journey with Microsoft Edge Security Mitigations
|
Yuki Chen
,
MJ0011
|
Windows Server Container - The New Panacea?
|
Saruhan Karademir
|
A platform base on visualization for protecting CAN bus security
|
Jianhao Liu
,
Minrui Yan
|
Security Vulnerabilities on Online Payment: Summary and Detection
|
Zhang Qing
,
Bai Guangdong
|
Old Skewl Hacking: DVB-T Black Button Pivot
|
Adam Laurie
|
Abusing the Mac Recovery OS and Local OS Update Process
|
Patrick Wardle
|
The Hype and Reality of AI in Vulnerability Discovery
|
Li Kang
|