Star 0

Talks

Title Humans
Symbolically Executing the Linux Kernel Vitaly Nikolenko , SpiderLabs
How to root Andorid 8 on PIXEL C. Yu Pan , Yang Dai , Ye Zhou , Qihoo 360 Technology Co., Ltd
Impersonate a 4G user through LTE IRAT handover vulnerabilities Yuwei Zheng , Qihoo 360 Technology Co., Ltd
Exploiting Vulnerabilities in AI Applications Kang Li , University of Georgia
CovNavi: Fuzzing-Driven Code Auditing And Vice Versa Aleksandar Nikolic , Cisco Talos Group
From 0 to Infinity.
UEFI BIOS firmware analysis at scale ABazhaniuk , Eclypsium, Inc
Neurosurgery for Industrial Routers: Security of Sarian OS Danila Parnishchev , Kaspersky Lab
From quantitative change to qualitative change --a new fuzzing method on Android. Zhang Qing , Bai Guangdong , Xiaomi Inc. , Singapore Institute of Technology
Discovering and Abusing Type Confusion Mathias Payer , PurdueUniversity
Synthetic Reality; Breaking macOS One Click at a Time. Patrick Wardle , Digita Security
Advanced Binary Instrumentation Framework Nanyang Technological University , Nguyen Anh Quynh
A Link Between Sandboxes James Forshaw , Google Inc.
I free your memory Slipper , PanguTeam