Star 0

Talks

Title Humans
Pearls of Non-exploitation Based Recon Tactics Fyodor Yarochkin , Vladimir Kropotov
What if Fire Sale occurs in Korea? SinCity
Breaking VoLTE, not VoIP SysSec@KAIST
Cyber security required to protect human life Yuji Ukai
THE ANSWER TO THE QUESTION "WHO?" WAVES OF VICTIMS OF THE ATTACKS MORE THAN AN ANSWER TO THE QUESTION "HOW?" Maria Garnaeva , Denis Makrushin
Breaking Font Parsers Celil UNUVER , Ebubekir KARUL
Analyzing Arcane Attack Vectors: Adobe Reader's Logical Way to SYSTEM Brian Gorenc , Abdul-Aziz Hariri , Jasiel Spelman
OS X kernel is as strong as its weakest part Liang Chen , Shuaitian Zhao
Cyberwar of Nation State Level Thegrugq
Hacking IBM’s GPFS Florian Grunow , Felix Wilhelm
Low-cost GPS Spoofing by SDR Tools Huang Lin , Yang Qing
Wireless(WPA) Network Based Packet Dissecting Gilgil , Yeongsik Moon
Imperfections of Accelerometers Make Smartphones Trackable Wenyuan Xu
Heading beyond the Edge of Windows 10 Security MJ0011
Security of Embedded Devices' Firmware - Fast and Furious at Large Scale Andrei Costin
Hacking from iOS8 to iOS9
Hacking Virtual Appliances Jeremy Brown