Bypassing Malware Detection Mechanisms in Online Banking
|
Jakub Kaluzny
,
Mateusz Olejarka
,
SecuRing
|
I Know Where You've Been: Geo-Inference Attacks via the Browser Cache
|
Yaoqi Jia
|
Forging the USB Armory
|
Andrea Barisani
,
Inverse Path
|
Hacking the Wireless World with Software Defined Radio - 2.0
|
Balint Seeber
|
DABiD: The Powerful Interactive Android Debugger for Android Malware Analysis
|
Jin-hyuk Jung
,
Jieun Lee
,
ENSEC
|
From Zero to Secure in One Minute
|
Nir Valtman
,
Moshe Ferber
,
NCR
|
Browsers Gone Wild
|
Angelo Prado
,
Xiaoran Wang
,
Salesforce.com
|
The Nightmare Behind the Cross Platform Mobile Apps Dream
|
Marco Grassi
,
Sebastian Guerrero
,
NowSecure
|
SLIME: Automated Anti-Sandboxing Disarmament System
|
Yosuke Chubachi
,
Kenji Aiko
,
FFRI, Inc.
|
Manna from Heaven: Improving the State of Wireless Rogue AP Attacks
|
Daniel Cuthbert
,
SensePost
|
Relaying EMV Contactless Transactions Using Off-the-Shelf Android Devices
|
Jordi Van den Breekel
,
KPMG
|
(In)Security of Mobile Banking
|
Eric Filiol
,
Paul Irolla
,
ESIEA - (C + V)^O Lab
|
The Underground Ecosystem of Credit Card Frauds
|
abhinav singh
,
JP Morgan
|
API Deobfuscator: Identifying Runtime-Obfuscated API Calls via Memory Access Analysis
|
Seokwoo Choi
|
Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence
|
Preeti Subramanian
,
SecPod Technologies
|
Client-Side Protection Against DOM-Based XSS Done Right (tm)
|
Martin Johns
,
Sebastian Lekies
,
Ben Stock
,
SAP AG
,
University of Bochum
,
University Erlangen-Nuremberg
|
Bar-Mitzva Attack: Breaking SSL with 13-Year Old RC4 Weakness
|
Itsik Mantin
,
Imperva
|
We Can Still Crack You! General Unpacking Method for Android Packer (no root)
|
Yeongung Park
,
ETRI
|
Information Technology Systems in a Post-Silicon World
|
Bernard S. Meyerson Ph.D.
,
IBM
|
MLD Considered Harmful - Breaking Another IPv6 Subprotocol
|
Antonios Atlasis
,
Jayson Salazar
,
Rafael Schaefer
,
secfu.net
,
ERNW GmbH
|
Resurrecting the READ_LOGS Permission on Samsung Devices
|
Ryan Johnson
,
Angelos Stavrou
,
George Mason University
,
Kryptowire
,
Kryptowire LLC
|
Hiding Behind Android Runtime (ART)
|
Paul Sabanal
,
IBM Security Systems
|
Locknote: Conclusions and Key Takeaways from Black Hat Asia 2015
|
Jeff Moss
,
U.S. Department of Homeland Security Advisory Council
|
Exploiting Social Navigation
|
Nimrod Partush
,
Meital Ben Sinai
,
Shir Yadid
,
Technion IIT
|
Understanding SCADA's Modbus Protocol
|
Justin Searle
,
Meeas Security
|
Decentralized Malware on the Blockchain
|
Christian Karam
,
Vitaly Kamluk
,
INTERPOL
,
Kaspersky Lab
|
Hopping on the CAN Bus
|
Eric Evenchick
|
Next Level Cheating and Leveling Up Mitigations
|
Joel St. John
,
Nicolas Guigo
,
iSEC Partners
,
NCC / iSECPartners
|