Bypassing Mitigations by Attacking JIT Server in Microsoft Edge
|
Ivan Fratric
|
Exploiting Branch Target Prediction
|
Jann Horn
|
Attacking a co-hosted VM: A hacker, a hammer and two memory modules
|
|
Strategic Keynote: Updating How We Think About Security
|
|
Back To The Future - Going Back In Time To Abuse Android’s JIT
|
|
Technical Keynote: iOS War Stories
|
Marco Grassi
,
Liang Chen
|
Chainspotting: Building Exploit Chains with Logic Bugs
|
Robert Miller
,
Georgi Geshev
|
A Tale of Two Mallocs: On Android libc Allocators
|
|
A walk with Shannon - A walkthrough of a pwn2own baseband exploit
|
|
L’art de l’Évasion: Modern VMWare Exploitation techniques
|
Jasiel Spelman
,
Abdul-Aziz Hariri
,
Brian Gorenc
|
Bochspwn Revolutions: Further Advancements in Detecting Kernel Infoleaks with x86 Emulation
|
Mateusz Jurczyk
|
Ghost in the locks
|
Timo Hirvonen
,
Tomi Tuominen
|
Dissecting QNX - Analyzing & Breaking QNX Exploit Mitigations and Secure Random Number Generators
|
Jos Wetzels
|