Symbolically Executing the Linux Kernel
|
Vitaly Nikolenko
,
SpiderLabs
|
How to root Andorid 8 on PIXEL C.
|
Yu Pan
,
Yang Dai
,
Ye Zhou
,
Qihoo 360 Technology Co., Ltd
|
Impersonate a 4G user through LTE IRAT handover vulnerabilities
|
Yuwei Zheng
,
Qihoo 360 Technology Co., Ltd
|
Exploiting Vulnerabilities in AI Applications
|
Kang Li
,
University of Georgia
|
CovNavi: Fuzzing-Driven Code Auditing And Vice Versa
|
Aleksandar Nikolic
,
Cisco Talos Group
|
From 0 to Infinity.
|
|
UEFI BIOS firmware analysis at scale
|
ABazhaniuk
,
Eclypsium, Inc
|
Neurosurgery for Industrial Routers: Security of Sarian OS
|
Danila Parnishchev
,
Kaspersky Lab
|
From quantitative change to qualitative change --a new fuzzing method on Android.
|
Zhang Qing
,
Bai Guangdong
,
Xiaomi Inc.
,
Singapore Institute of Technology
|
Discovering and Abusing Type Confusion
|
Mathias Payer
,
PurdueUniversity
|
Synthetic Reality; Breaking macOS One Click at a Time.
|
Patrick Wardle
,
Digita Security
|
Advanced Binary Instrumentation Framework
|
Nanyang Technological University
,
Nguyen Anh Quynh
|
A Link Between Sandboxes
|
James Forshaw
,
Google Inc.
|
I free your memory
|
Slipper
,
PanguTeam
|