Inspecting and injecting. IronPython and .NET DLR memory reflection blazing through hundreds of GB in no time.
|
Shane Macaulay
,
IOActive, Inc.
|
Cyber WMD: Vulnerable IoT
|
Yuhao Song
,
Huiming Liu
,
Tencent Security Xuanwu Lab
,
GeekPwn Lab
,
KEEN
|
What if encrypted communications are not as secure as we think?
|
|
Inside Stegosploit
|
Saumil Shah
|
Low cost radio wave attacks on modern platforms
|
Intel Corporation
|
Dig into the qemu security and gain 50+ CVE in one year
|
Qiang Li
,
ZhiBin Hu
,
Mei Wang
,
Qihoo 360
|
Automotive Intrusion Detection
|
Jun Li
,
Qing Yang
,
Unicorn Team
|
Touch-and-Go Elections - How convenience has taken over security, again.
|
|
Port(al) to the iOS core - Introduction to previous private iOS Kernel Exploitation Techniques
|
Stefan Esser
|
Hijacking .NET to Defend PowerShell
|
Amanda Rousseau
,
Endgame
|
The Dark Composition (DComposition) of Win32k - Attacking the Shadow Part of Graphic Subsystem to Gain System Priviledge
|
Qihoo 360
|
Introduction - Invite only bug bounty program
|
Bruce Monroe
,
Intel Corporation
|
Exploring Your System Deeper is Not Naughty
|
Oleksandr Bazhaniuk
,
Yuriy Bulygin
,
Mikhail Gorobets
,
Andrew Furtak
,
John Loucaides
,
Intel Security
|
Pwning Nexus of Every Pixel: Chain of Bugs demystified
|
Qidan He
,
Tencent Keen Security Lab
,
Tencent, Inc.
|
Cyberwar and other modern myths
|
|
State of Windows Application Security: Shared Libraries
|
Chuanda Ding
,
Tencent, Inc.
,
Tencent Security Xuanwu Lab
|
Microsoft's strategy and technology improvements for mitigating native remote code execution
|
Matt Miller
,
David Weston
,
Microsoft Corporation
|
Privilege escalation on high-end servers due to implementation gaps in CPU Hot-Add flow
|
Intel Corporation
|
Escape from VMware Workstation by using "Hearthstone"
|
Qinghao Tang
,
Xinlei Ying
,
Qihoo 360
|
Lots of Squats: APTs Never Miss Leg Day
|
|
Logic Bug Hunting in Chrome on Android
|
Robert Miller
,
Georgi Geshev
,
MWR InfoSecurity
|
Secure boot: they're doing it wrong.
|
Netflix
|
Attacking DSMx Spread Spectrum Frequency Hopping RC Drone Protcol
|
Trend Micro, Inc.
|
How to find the vulnerability to bypass the Control Flow Guard
|
Henry Li
,
Trend Micro, Inc.
|
A platform base on visualization for protecting CAN bus security
|
Jianhao Liu
,
Minrui Yan
,
Qihoo 360
|
Fuzzflow Framework and Windows Guided Fuzzing
|
Richard Johnson
,
Cisco Talos Group
|
Introduction - New bug bounty program
|
Microsoft Corporation
|