Star 0

Talks

Title Humans
Beyond Adversarial Learning — Data Scaling Attacks in Deep Learning Applications Kang Li , Institute for Cybersecurity and Privacy, University of Georgia
Bugs Aren't Random: A Unified Perspective on Building and Breaking Dan Kaminsky , White Ops
Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning Changyu Li
Security Research Over the Windows (kernel) Peter Hlavaty , Tencent Keen Security Lab
Spreading malware with Google (Nice Quilombo) Fabian Cuchietti
Blasted to Bits: Mutilating Media in a Minute Zoz
Androsia: Securing 'Data in Process' for your Android Apps Samit Anwer
Triton and Symbolic Execution on GDB Weibo Chen
Lessons Learned from Five Years of Building Capture the Flag Vito Genovese , Legitimate Business Syndicate
Hacking Intranet from Outside: Security Problems of Cross Origin Resource Sharing (CORS) Dr. Haixin Duan , Jianjun Chen , Tsinghua University
I Am Groot: Examining the Guardians of Windows 10 Security Chuanda Ding , Tencent Security Xuanwu Lab
Welcome to DEF CON China Ma Jie , Zhang Yaqin , The Dark Tangent
When Memory-Safe Languages Become Unsafe Mingshen Sun , Yulong Zhang , Dr. Wei Tao , Baidu Security Lab , Baidu Inc.
You Logged Into My Account Daizibukaikou
From Memory Safety to Non-bypassable Security Dr. Wei (Lenx) Tao , Peking University , Baidu Inc.
Transparent Malware Debugging on x86 and ARM Zhenyu Ning , Wayne State University
Fooling Image Search Engine Yuanjun Gong
General ways to find and exploit Path Traversal Vulnerabilities on Android APPs Xiaobo Xiang (Elphet)
From Dark Visitors to Valued Allies: The Evolution of the Hacker Community in Asia and Around the World! Jayson E. Street
Smart Contract Hacking Konstantinos Karagiannis , BT Americas
DEF CON Groups Panel Peter Wesley