Beyond Adversarial Learning — Data Scaling Attacks in Deep Learning Applications
|
Kang Li
,
Institute for Cybersecurity and Privacy, University of Georgia
|
Bugs Aren't Random: A Unified Perspective on Building and Breaking
|
Dan Kaminsky
,
White Ops
|
Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning
|
Changyu Li
|
Security Research Over the Windows (kernel)
|
Peter Hlavaty
,
Tencent Keen Security Lab
|
Spreading malware with Google (Nice Quilombo)
|
Fabian Cuchietti
|
Blasted to Bits: Mutilating
Media in a Minute
|
Zoz
|
Androsia: Securing 'Data in Process' for your Android Apps
|
Samit Anwer
|
Triton and Symbolic Execution on GDB
|
Weibo Chen
|
Lessons Learned from Five Years of Building Capture the Flag
|
Vito Genovese
,
Legitimate Business Syndicate
|
Hacking Intranet from Outside: Security Problems of Cross Origin Resource Sharing (CORS)
|
Dr. Haixin Duan
,
Jianjun Chen
,
Tsinghua University
|
I Am Groot: Examining the Guardians of Windows 10 Security
|
Chuanda Ding
,
Tencent Security Xuanwu Lab
|
Welcome to DEF CON China
|
Ma Jie
,
Zhang Yaqin
,
The Dark Tangent
|
When Memory-Safe Languages Become Unsafe
|
Mingshen Sun
,
Yulong Zhang
,
Dr. Wei Tao
,
Baidu Security Lab
,
Baidu Inc.
|
You Logged Into My Account
|
Daizibukaikou
|
From Memory Safety to Non-bypassable Security
|
Dr. Wei (Lenx) Tao
,
Peking University
,
Baidu Inc.
|
Transparent Malware Debugging on x86 and ARM
|
Zhenyu Ning
,
Wayne State University
|
Fooling Image Search Engine
|
Yuanjun Gong
|
General ways to find and exploit Path Traversal Vulnerabilities on Android APPs
|
Xiaobo Xiang (Elphet)
|
From Dark Visitors to Valued Allies: The Evolution of the Hacker Community in Asia and Around the World!
|
Jayson E. Street
|
Smart Contract Hacking
|
Konstantinos Karagiannis
,
BT Americas
|
DEF CON Groups Panel
|
Peter Wesley
|