Star 0

Talks

Title Humans
Everything You Know About Password-Stealing Is Wrong Cormac Herley , Microsoft Corporation
On the Fragility and Limitations of Current Browser-Provided Clickjacking Protection Schemes Mario Heiderich , Sebastian Lekies , Martin Johns , Dennis Appelt , Thorsten Holz , SAP Research , Ruhr University
Abusing Notification Services on Smartphones for Phishing and Spamming Zhi Xu , Sencun Zhu , Pennsylvania State University
iOS and the Rising Cost of Reliable Exploitation Dionysus Blazakis
Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming Andrei Homescu , Michael Stewart , Per Larsen , Stefan Brunthaler , Michael Franz , University of California Irvine
WAFFle: Fingerprinting Filter Rules of Web Application Firewalls Sebastian Schinzel , Isabell Schmitt , University of Erlangen-Nuremberg
Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks Ralf-Philipp Weinmann , University of Luxembourg
SMT Solvers in Software Security Sean Heelan , Julien Vanegue , Rolf Rolles , Microsoft Security Science , Immunity Inc.
The Future of HTTPS Nicolas Lidzborski , Sid Stamm , Mozilla , Google Inc.
Read It Twice! A Mass-Storage-Based TOCTTOU Attack Collin Mulliner , Benjamin Michéle , Technische Universität Berlin , Telekom Innovation Laboratories
Under New Management: Practical Attacks on SNMPv3 Nigel Lawrence , Patrick Traynor, Georgia Institute of Technology
Defcon Behind the Scene Jeff Moss , Black Hat
Off-Path Attacking the Web Yossi Gilad , Amir Herzberg , Bar Ilan University
Security Analysis of Smartphone Point-of-Sale Systems WesLee Frisby , Benjamin Moench , Benjamin Recht , Thomas Ristenpart , University of Wisconsin-Madison
Web-based Attacks on Host-Proof Encrypted Storage Antoine Delignat-Lavaud , Karthikeyan Bhargavan , INRIA , ENS Cachan
Frankenstein: Stitching Malware from Benign Binaries Vishwath Mohan , Kevin W. Hamlen , University of Texas at Dallas