Nation-State Moneymule's Hunting Season – APT Attacks Targeting Financial Institutions
|
Chi-en (Ashley) Shen
,
Kyoung-ju Kwak
,
Min-Chang Jang
,
Korea Financial Security Institute
,
KFSI (Korea Financial Security Institute) and Korea University
|
Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables
|
Kavya Racharla
,
Sumanth Naropanth
,
Intel Corporation
,
Deep Armor
|
New Compat Vulnerabilities in Linux Device Drivers
|
Chenfu Bao
,
Pengfei Ding
,
Baidu Security Lab
|
Breach Detection At Scale With AWS Honey Tokens
|
Dan Bourke
,
Daniel Grzelak
,
Atlassian
|
Locknote: Conclusions and Key Takeaways from Black Hat Asia 2018
|
Anthony Lai
,
Jeff Moss
,
Lidia Giuliano
,
The Grugq
,
Valkyrie-X Security Research Group
,
Females in IT and Telecommunications
,
Comae
|
When Good Turns Evil: Using Intel SGX to Stealthily Steal Bitcoins
|
Michael Schwarz
,
Moritz Lipp
,
Graz University of Technology
|
Server Tailgating - A Chosen-PlainText Attack on RDP
|
Eyal Karni
,
Roman Blachman
,
Yaron Zinar
,
Preempt
|
UbootKit: A Worm Attack for the Bootloader of IoT Devices
|
Chen GENG
,
Jingyu YANG
,
Tencent, Inc.
|
Breaking the Attack Graph: How to Leverage Graphs to Strengthen Security in a Domain Environment
|
Marina Simakov
,
Microsoft Corporation
|
Tales from the NOC: Going Public in Asia
|
Bart Stump
,
Neil Wyler
,
Red Sky
,
RSA
|
A Deal with the Devil: Breaking Smart Contracts
|
David Wong
,
Mason Hemmel
,
NCC Group
|
Prison Break Season 6: Defeating the Mitigations Adopted by Android OEMs
|
Jun Yao
,
Tong Lin
,
Core team
|
KSMA: Breaking Android Kernel Isolation and Rooting with ARM MMU Features
|
Baozeng Ding
,
Chengming Yang
,
Yang Song
,
Yong Wang
,
Pandora Lab of Ali Security, Alibaba Group
|
VSPMiner: Detecting Security Hazards in SEAndroid Vendor Customizations via Large-Scale Supervised Machine Learning
|
Xiangyu Liu
,
Yang Song
,
Yi Zhang
,
Alibaba Inc.
,
Pandora Lab of Ali Security, Alibaba Group
|
Counter-Infiltration: Future-Proof Counter Attacks Against Exploit Kit Infrastructure
|
Hiroshi Kumagai
,
Masaki Kamizono
,
Takahiro Kasama
,
Yin Minn Pa Pa
,
PwC Japan
,
NICT
,
PwC
|
AES Wireless Keyboard – Template Attack for Eavesdropping
|
Kwonyoup Kim
,
Sangryeol Ryu
,
Taehyun Kim
,
Taewon Kim
,
SNT Works, Inc.
|
A Short Course in Cyber Warfare
|
The Grugq
,
Comae
|
Documenting the Undocumented: The Rise and Fall of AMSI
|
Tal Liberman
,
enSilo Inc
|
Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation)
|
Daniel Bohannon
,
Mandiant, a division of FireEye, Inc.
|
Shadow-Box v2: The Practical and Omnipotent Sandbox for ARM
|
Jun-Hyeok Park
,
Seunghun Han
,
National Security Research Institute of South Korea
|
eMMC & UFS: Security, Vulnerabilities, Rootkits
|
Oleg Yeskov
,
Vadym Kolisnichenko
|
Cyber Comrades: Alliance-Building in Cyberspace
|
Kenneth Geers
,
Comodo / NATO Cyber Centre
|
International Problems: Serialized Fuzzing for ICU Vulnerabilities
|
Yuan Deng
,
Ant-Financial Light-Year Security Lab
|
Back To The Epilogue: How to Evade Windows' Control Flow Guard with Less than 16 Bytes
|
Andrea Biondo
,
Daniele Lain
,
Mauro Conti
,
University of Padua
|
Mac-A-Mal: An Automated Platform for Mac Malware Hunting
|
Fabio Massacci
,
Pham Duy Phuc
,
University of Trento, Italy
,
Sfylabs BV, the Netherlands
|
I Don't Want to Sleep Tonight: Subverting Intel TXT with S3 Sleep
|
Jun-Hyeok Park
,
Seunghun Han
,
National Security Research Institute of South Korea
|
RustZone: Writing Trusted Applications in Rust
|
Eric Evenchick
,
Atredis Partners
|
return-to-csu: A New Method to Bypass 64-bit Linux ASLR
|
Hector Marco-Gisbert
,
Ismael Ripoll
,
University of the West of Scotland
,
Universidad Politécnica de Valencia
|
XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot
|
Daiping Liu
,
Mingwei Zhang
,
Ravi Sahita
,
University of Delaware
,
Intel Corporation
|
Death Profile
|
Ju Zhu
,
Moony Li
,
Trend Micro, Inc.
|
National Cyber-Aggression and Private-Sector Internet Infrastructure
|
Bill Woodcock
,
Packet Clearing House
|
All Your Payment Tokens Are Mine: Vulnerabilities of Mobile Payment Systems
|
Zhe Zhou
,
Fudan University
|
Hourglass Model 2.0: Case Study of Southeast Asia Underground Services Abusing Global 2FA
|
Anna Chung
|
Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis
|
Moritz Contag
,
Tim Blazytko
,
Ruhr-Universität Bochum
|
Analyzing & Breaking Exploit Mitigations and PRNGs on QNX for Automotive, Industrial, Medical and other Embedded Systems
|
Ali Abbasi
,
Jos Wetzels
,
DISTRIBUTED AND EMBEDDED SYSTEMS SECURITY GROUP, UNIVERSITY OF TWENTE
,
Midnight Blue Labs
|
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!
|
Orange Tsai
|