Presentation | Speaker | Slides | ||
---|---|---|---|---|
DNS as a Defense Vector |
Paul Vixie |
![]() |
||
Purple Teaming: One year after going from full time breaker to part time fixer |
Chris Gates |
![]() |
Not available |
|
High Performance Fuzzing |
Richard Johnson |
![]() |
||
Design, Implementation and Bypass of the Chain-of-trust Model of iOS |
Team Pangu |
![]() |
Not available |
|
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election |
Vanessa Teague |
![]() |
||
MalwAirDrop: Compromising iDevices via AirDrop |
Mark Dowd |
![]() |
||
Broadcasting Your Attack: Security Testing DAB Radio In Cars |
Andy Davis |
![]() |
||
Windows 10: 2 Steps Forward, 1 Step Back |
James Forshaw |
![]() |
||
Practical Intel SMEP Bypass Techniques on Linux |
Vitaly Nikolenko |
![]() |
||
Advanced SOHO Router Exploitation |
Lyon Yang |
![]() |
||
Why Attacker's Toolsets Do What They Do |
Matt McCormack |
![]() |
||
SDN Security |
David Jorm |
![]() |
||
Window Driver Attack Surface: Some New Insights |
Ilja Van Sprundel |
![]() |
||
Abusing Adobe Reader¹s JavaScript APIs |
Jasiel Spelman & Matt Molinyawe |
![]() |
||
High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC |
Joshua “kernelsmith” Smith |
![]() |
||
VoIP Wars: Destroying Jar Jar Lync |
Fatih Ozavci |
![]() |
||
VENOM |
Jason Geffner |
![]() |
||
Fruit Salad, yummy yummy: An analysis of ApplePay |
Peter Fillmore |
![]() |
||
A Peek Under The Blue Coat |
Raphaël Rigo |
![]() |
||
Hacked to Death |
Chris Rock |
![]() |
Not available |
|
Automated Malware Analysis: A Behavioural Approach to Automated Unpacking |
Karl Denton |
![]() |
||
Tasty Malware Analysis with T.A.C.O.: Bringing Cuckoo Reports into IDA Pro |
Jason Jones |
![]() |
||
A Practical Robust Mitigation and Testing Tool for Use-After-Free Vulnerabilities |
Yves Younan |
![]() |
||
Testing TLS - How To Check If Your TLS Implementation Is Correct |
Hubert Kario |
![]() |
||
Hack NFC Access Cards & Steal Credit Card Data with Android For Fun &Profit |
Babil Golam Sarwar |
![]() |
Not available |
|
Hacking the Wireless World - Software Defined Radio Exploits |
Balint Seeber |
![]() |
||
Microarchitecture Independent VM Introspection |
Shane Macaulay |
![]() |
||
Spread Spectrum Satcom Hacking: Attacking the Globalstar SDS |
Colby Moore ** BY VIDEO ** |
![]() |
Not available |