Star 0

Talks

Title Humans
Bypassing Mitigations by Attacking JIT Server in Microsoft Edge Ivan Fratric
Exploiting Branch Target Prediction Jann Horn
Attacking a co-hosted VM: A hacker, a hammer and two memory modules
Strategic Keynote: Updating How We Think About Security
Back To The Future - Going Back In Time To Abuse Android’s JIT
Technical Keynote: iOS War Stories Marco Grassi , Liang Chen
Chainspotting: Building Exploit Chains with Logic Bugs Robert Miller , Georgi Geshev
A Tale of Two Mallocs: On Android libc Allocators
A walk with Shannon - A walkthrough of a pwn2own baseband exploit
L’art de l’Évasion: Modern VMWare Exploitation techniques Jasiel Spelman , Abdul-Aziz Hariri , Brian Gorenc
Bochspwn Revolutions: Further Advancements in Detecting Kernel Infoleaks with x86 Emulation Mateusz Jurczyk
Ghost in the locks Timo Hirvonen , Tomi Tuominen
Dissecting QNX - Analyzing & Breaking QNX Exploit Mitigations and Secure Random Number Generators Jos Wetzels