Star 0

Talks

Title Humans
Nation-State Moneymule's Hunting Season – APT Attacks Targeting Financial Institutions Chi-en (Ashley) Shen , Kyoung-ju Kwak , Min-Chang Jang , Korea Financial Security Institute , KFSI (Korea Financial Security Institute) and Korea University
Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables Kavya Racharla , Sumanth Naropanth , Intel Corporation , Deep Armor
New Compat Vulnerabilities in Linux Device Drivers Chenfu Bao , Pengfei Ding , Baidu Security Lab
Breach Detection At Scale With AWS Honey Tokens Dan Bourke , Daniel Grzelak , Atlassian
Locknote: Conclusions and Key Takeaways from Black Hat Asia 2018 Anthony Lai , Jeff Moss , Lidia Giuliano , The Grugq , Valkyrie-X Security Research Group , Females in IT and Telecommunications , Comae
When Good Turns Evil: Using Intel SGX to Stealthily Steal Bitcoins Michael Schwarz , Moritz Lipp , Graz University of Technology
Server Tailgating - A Chosen-PlainText Attack on RDP Eyal Karni , Roman Blachman , Yaron Zinar , Preempt
UbootKit: A Worm Attack for the Bootloader of IoT Devices Chen GENG , Jingyu YANG , Tencent, Inc.
Breaking the Attack Graph: How to Leverage Graphs to Strengthen Security in a Domain Environment Marina Simakov , Microsoft Corporation
Tales from the NOC: Going Public in Asia Bart Stump , Neil Wyler , Red Sky , RSA
A Deal with the Devil: Breaking Smart Contracts David Wong , Mason Hemmel , NCC Group
Prison Break Season 6: Defeating the Mitigations Adopted by Android OEMs Jun Yao , Tong Lin , Core team
KSMA: Breaking Android Kernel Isolation and Rooting with ARM MMU Features Baozeng Ding , Chengming Yang , Yang Song , Yong Wang , Pandora Lab of Ali Security, Alibaba Group
VSPMiner: Detecting Security Hazards in SEAndroid Vendor Customizations via Large-Scale Supervised Machine Learning Xiangyu Liu , Yang Song , Yi Zhang , Alibaba Inc. , Pandora Lab of Ali Security, Alibaba Group
Counter-Infiltration: Future-Proof Counter Attacks Against Exploit Kit Infrastructure Hiroshi Kumagai , Masaki Kamizono , Takahiro Kasama , Yin Minn Pa Pa , PwC Japan , NICT , PwC
AES Wireless Keyboard – Template Attack for Eavesdropping Kwonyoup Kim , Sangryeol Ryu , Taehyun Kim , Taewon Kim , SNT Works, Inc.
A Short Course in Cyber Warfare The Grugq , Comae
Documenting the Undocumented: The Rise and Fall of AMSI Tal Liberman , enSilo Inc
Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) Daniel Bohannon , Mandiant, a division of FireEye, Inc.
Shadow-Box v2: The Practical and Omnipotent Sandbox for ARM Jun-Hyeok Park , Seunghun Han , National Security Research Institute of South Korea
eMMC & UFS: Security, Vulnerabilities, Rootkits Oleg Yeskov , Vadym Kolisnichenko
Cyber Comrades: Alliance-Building in Cyberspace Kenneth Geers , Comodo / NATO Cyber Centre
International Problems: Serialized Fuzzing for ICU Vulnerabilities Yuan Deng , Ant-Financial Light-Year Security Lab
Back To The Epilogue: How to Evade Windows' Control Flow Guard with Less than 16 Bytes Andrea Biondo , Daniele Lain , Mauro Conti , University of Padua
Mac-A-Mal: An Automated Platform for Mac Malware Hunting Fabio Massacci , Pham Duy Phuc , University of Trento, Italy , Sfylabs BV, the Netherlands
I Don't Want to Sleep Tonight: Subverting Intel TXT with S3 Sleep Jun-Hyeok Park , Seunghun Han , National Security Research Institute of South Korea
RustZone: Writing Trusted Applications in Rust Eric Evenchick , Atredis Partners
return-to-csu: A New Method to Bypass 64-bit Linux ASLR Hector Marco-Gisbert , Ismael Ripoll , University of the West of Scotland , Universidad Politécnica de Valencia
XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot Daiping Liu , Mingwei Zhang , Ravi Sahita , University of Delaware , Intel Corporation
Death Profile Ju Zhu , Moony Li , Trend Micro, Inc.
National Cyber-Aggression and Private-Sector Internet Infrastructure Bill Woodcock , Packet Clearing House
All Your Payment Tokens Are Mine: Vulnerabilities of Mobile Payment Systems Zhe Zhou , Fudan University
Hourglass Model 2.0: Case Study of Southeast Asia Underground Services Abusing Global 2FA Anna Chung
Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis Moritz Contag , Tim Blazytko , Ruhr-Universität Bochum
Analyzing & Breaking Exploit Mitigations and PRNGs on QNX for Automotive, Industrial, Medical and other Embedded Systems Ali Abbasi , Jos Wetzels , DISTRIBUTED AND EMBEDDED SYSTEMS SECURITY GROUP, UNIVERSITY OF TWENTE , Midnight Blue Labs
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! Orange Tsai