Cisco ASA Episode 2: Striking back – Internals and Mitigations
|
Cedric Halbronn
|
Hypervisor-Assisted Ring0 Debugging with radare2
|
Lars Haukli
|
Inside Android’s SafetyNet Attestation: What it can and can’t do lessons learned from a large scale deployment
|
Colin Mulliner
|
Biting the Apple that feeds you – macOS Kernel Fuzzing
|
Alex Plaskett
|
The Black Art of Wireless Post-Exploitation: Bypassing Port-Based Access Controls Using Indirect Wireless Pivots
|
Gabriel Ryan
|
Secrets Of The Motherboard (Shit My Chipset Says)
|
Graham Sutherland
|
Cracking HiTag2 Crypto – Weaponising Academic Attacks for Breaking and Entering
|
Kevin Sheldrake
|
Persisting with Microsoft Office: Abusing Extensibility Options
|
William Knowles
|
BaRMIe – Poking Java’s Back Door
|
Nicky Bloor
|
Checking BIOS protections offline with just the firmware updates
|
Oleksandr Bazhaniuk
|
Chkrootkit: Eating APTs for breakfast since 1997
|
Nelson Murilo
|
Subgraph OS: Hardening a Linux Desktop
|
David Mirza Ahmad
|
See no evil, hear no evil: Hacking invisibly and silently with light and sound
|
Matt Wixey
|
The Internet of Us
|
Don A. Bailey
|
Linux Containers Made of Steel
|
Jessie Frazelle
|
So You Want to Hack Radios
|
Marc Newlin
|
Lessons Learned Hunting IoT Malware
|
Olivier Bilodeau
|
Breaking Historical Ciphers with Modern Algorithms
|
Klaus Schmeh
|
Red Team Revenge : Attacking Microsoft ATA
|
Nikhil Mittal
|
Hide Yo Keys, Hide Yo Car: Remotely Exploiting Connected Vehicle APIs and Apps
|
Aaron Guzman
|