From SSRF to RCE
|
Yongtao Wang
|
ZigWasp - Discovery the secret of ZigBee Firmware and accelerate the analysis
|
|
Hacking Microcontroller Firmware through USB
|
Boris Larin
|
PAC-MAn and Ghosts: A practice and breakthrough on Pointer Authentication in iOS
|
Xiaolong Bai
,
Min (Spark) Zheng
,
Alibaba Inc.
|
Attack Infrastructure for the Modern Red-Team
|
Michael Leibowitz
,
Topher Timzen
|
Mornigari: Overview of the Latest Windows OS kernel exploits
|
Anton Ivanov
,
Boris Larin
|
Karta - a source code assisted binary matching plugin for IDA
|
Eyal Itkin
|
Danger of using fullly homomorphic encryption, a look at Microsoft SEAL
|
Minrui Yan
|
Tales from the Bug Mine: Highlights from the 2018 Android Security Bulletin
|
Google Inc.
|
Pandora, Cassandra, and Aristotle: An Ancient Greek Perspective on Hardware Trojans
|
|
Vs. com.apple.security.sandbox
|
CENSUS S.A.
|
Device Driver Debauchery and MSR Madness
|
|
Misinformation frameworks, tatics, techniques and processes
|
Sara-Jayne Terp
|
IR-dventures from the vendors basements, Circa early 2000s
|
|
Attacking .NET Framework through CLR
|
Yu Hong
|
Weaponized WiFi Attack Tool
|
|
A Dive into Windows Hello: Is it Really More Secure than a Password?
|
Hyoung-Kee Choi
|
Adversarial Examples: Using AI to Cheat AI
|
Tencent Security Platform Department
|
Memsad: why clearing memory is hard.
|
IOActive, Inc.
|