Star 0

Talks

Title Humans
From SSRF to RCE Yongtao Wang
ZigWasp - Discovery the secret of ZigBee Firmware and accelerate the analysis
Hacking Microcontroller Firmware through USB Boris Larin
PAC-MAn and Ghosts: A practice and breakthrough on Pointer Authentication in iOS Xiaolong Bai , Min (Spark) Zheng , Alibaba Inc.
Attack Infrastructure for the Modern Red-Team Michael Leibowitz , Topher Timzen
Mornigari: Overview of the Latest Windows OS kernel exploits Anton Ivanov , Boris Larin
Karta - a source code assisted binary matching plugin for IDA Eyal Itkin
Danger of using fullly homomorphic encryption, a look at Microsoft SEAL Minrui Yan
Tales from the Bug Mine: Highlights from the 2018 Android Security Bulletin Google Inc.
Pandora, Cassandra, and Aristotle: An Ancient Greek Perspective on Hardware Trojans
Vs. com.apple.security.sandbox CENSUS S.A.
Device Driver Debauchery and MSR Madness
Misinformation frameworks, tatics, techniques and processes Sara-Jayne Terp
IR-dventures from the vendors basements, Circa early 2000s
Attacking .NET Framework through CLR Yu Hong
Weaponized WiFi Attack Tool
A Dive into Windows Hello: Is it Really More Secure than a Password? Hyoung-Kee Choi
Adversarial Examples: Using AI to Cheat AI Tencent Security Platform Department
Memsad: why clearing memory is hard. IOActive, Inc.