Star 0

Talks

Title Humans
Bypassing Malware Detection Mechanisms in Online Banking Jakub Kaluzny , Mateusz Olejarka , SecuRing
I Know Where You've Been: Geo-Inference Attacks via the Browser Cache Yaoqi Jia
Forging the USB Armory Andrea Barisani , Inverse Path
Hacking the Wireless World with Software Defined Radio - 2.0 Balint Seeber
DABiD: The Powerful Interactive Android Debugger for Android Malware Analysis Jin-hyuk Jung , Jieun Lee , ENSEC
From Zero to Secure in One Minute Nir Valtman , Moshe Ferber , NCR
Browsers Gone Wild Angelo Prado , Xiaoran Wang , Salesforce.com
The Nightmare Behind the Cross Platform Mobile Apps Dream Marco Grassi , Sebastian Guerrero , NowSecure
SLIME: Automated Anti-Sandboxing Disarmament System Yosuke Chubachi , Kenji Aiko , FFRI, Inc.
Manna from Heaven: Improving the State of Wireless Rogue AP Attacks Daniel Cuthbert , SensePost
Relaying EMV Contactless Transactions Using Off-the-Shelf Android Devices Jordi Van den Breekel , KPMG
(In)Security of Mobile Banking Eric Filiol , Paul Irolla , ESIEA - (C + V)^O Lab
The Underground Ecosystem of Credit Card Frauds abhinav singh , JP Morgan
API Deobfuscator: Identifying Runtime-Obfuscated API Calls via Memory Access Analysis Seokwoo Choi
Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian , SecPod Technologies
Client-Side Protection Against DOM-Based XSS Done Right (tm) Martin Johns , Sebastian Lekies , Ben Stock , SAP AG , University of Bochum , University Erlangen-Nuremberg
Bar-Mitzva Attack: Breaking SSL with 13-Year Old RC4 Weakness Itsik Mantin , Imperva
We Can Still Crack You! General Unpacking Method for Android Packer (no root) Yeongung Park , ETRI
Information Technology Systems in a Post-Silicon World Bernard S. Meyerson Ph.D. , IBM
MLD Considered Harmful - Breaking Another IPv6 Subprotocol Antonios Atlasis , Jayson Salazar , Rafael Schaefer , secfu.net , ERNW GmbH
Resurrecting the READ_LOGS Permission on Samsung Devices Ryan Johnson , Angelos Stavrou , George Mason University , Kryptowire , Kryptowire LLC
Hiding Behind Android Runtime (ART) Paul Sabanal , IBM Security Systems
Locknote: Conclusions and Key Takeaways from Black Hat Asia 2015 Jeff Moss , U.S. Department of Homeland Security Advisory Council
Exploiting Social Navigation Nimrod Partush , Meital Ben Sinai , Shir Yadid , Technion IIT
Understanding SCADA's Modbus Protocol Justin Searle , Meeas Security
Decentralized Malware on the Blockchain Christian Karam , Vitaly Kamluk , INTERPOL , Kaspersky Lab
Hopping on the CAN Bus Eric Evenchick
Next Level Cheating and Leveling Up Mitigations Joel St. John , Nicolas Guigo , iSEC Partners , NCC / iSECPartners