Star 0

Talks

Title Humans
Inspecting and injecting. IronPython and .NET DLR memory reflection blazing through hundreds of GB in no time. Shane Macaulay , IOActive, Inc.
Cyber WMD: Vulnerable IoT Yuhao Song , Huiming Liu , Tencent Security Xuanwu Lab , GeekPwn Lab , KEEN
What if encrypted communications are not as secure as we think?
Inside Stegosploit Saumil Shah
Low cost radio wave attacks on modern platforms Intel Corporation
Dig into the qemu security and gain 50+ CVE in one year Qiang Li , ZhiBin Hu , Mei Wang , Qihoo 360
Automotive Intrusion Detection Jun Li , Qing Yang , Unicorn Team
Touch-and-Go Elections - How convenience has taken over security, again.
Port(al) to the iOS core - Introduction to previous private iOS Kernel Exploitation Techniques Stefan Esser
Hijacking .NET to Defend PowerShell Amanda Rousseau , Endgame
The Dark Composition (DComposition) of Win32k - Attacking the Shadow Part of Graphic Subsystem to Gain System Priviledge Qihoo 360
Introduction - Invite only bug bounty program Bruce Monroe , Intel Corporation
Exploring Your System Deeper is Not Naughty Oleksandr Bazhaniuk , Yuriy Bulygin , Mikhail Gorobets , Andrew Furtak , John Loucaides , Intel Security
Pwning Nexus of Every Pixel: Chain of Bugs demystified Qidan He , Tencent Keen Security Lab , Tencent, Inc.
Cyberwar and other modern myths
State of Windows Application Security: Shared Libraries Chuanda Ding , Tencent, Inc. , Tencent Security Xuanwu Lab
Microsoft's strategy and technology improvements for mitigating native remote code execution Matt Miller , David Weston , Microsoft Corporation
Privilege escalation on high-end servers due to implementation gaps in CPU Hot-Add flow Intel Corporation
Escape from VMware Workstation by using "Hearthstone" Qinghao Tang , Xinlei Ying , Qihoo 360
Lots of Squats: APTs Never Miss Leg Day
Logic Bug Hunting in Chrome on Android Robert Miller , Georgi Geshev , MWR InfoSecurity
Secure boot: they're doing it wrong. Netflix
Attacking DSMx Spread Spectrum Frequency Hopping RC Drone Protcol Trend Micro, Inc.
How to find the vulnerability to bypass the Control Flow Guard Henry Li , Trend Micro, Inc.
A platform base on visualization for protecting CAN bus security Jianhao Liu , Minrui Yan , Qihoo 360
Fuzzflow Framework and Windows Guided Fuzzing Richard Johnson , Cisco Talos Group
Introduction - New bug bounty program Microsoft Corporation