| Presentation | Speaker | Slides | ||
|---|---|---|---|---|
|
DNS as a Defense Vector |
Paul Vixie |
|
||
|
Purple Teaming: One year after going from full time breaker to part time fixer |
Chris Gates |
|
Not available |
|
|
High Performance Fuzzing |
Richard Johnson |
|
||
|
Design, Implementation and Bypass of the Chain-of-trust Model of iOS |
Team Pangu |
|
Not available |
|
|
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election |
Vanessa Teague |
|
||
|
MalwAirDrop: Compromising iDevices via AirDrop |
Mark Dowd |
|
||
|
Broadcasting Your Attack: Security Testing DAB Radio In Cars |
Andy Davis |
|
||
|
Windows 10: 2 Steps Forward, 1 Step Back |
James Forshaw |
|
||
|
Practical Intel SMEP Bypass Techniques on Linux |
Vitaly Nikolenko |
|
||
|
Advanced SOHO Router Exploitation |
Lyon Yang |
|
||
|
Why Attacker's Toolsets Do What They Do |
Matt McCormack |
|
||
|
SDN Security |
David Jorm |
|
||
|
Window Driver Attack Surface: Some New Insights |
Ilja Van Sprundel |
|
||
|
Abusing Adobe Reader¹s JavaScript APIs |
Jasiel Spelman & Matt Molinyawe |
|
||
|
High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC |
Joshua “kernelsmith” Smith |
|
||
|
VoIP Wars: Destroying Jar Jar Lync |
Fatih Ozavci |
|
||
|
VENOM |
Jason Geffner |
|
||
|
Fruit Salad, yummy yummy: An analysis of ApplePay |
Peter Fillmore |
|
||
|
A Peek Under The Blue Coat |
Raphaël Rigo |
|
||
|
Hacked to Death |
Chris Rock |
|
Not available |
|
|
Automated Malware Analysis: A Behavioural Approach to Automated Unpacking |
Karl Denton |
|
||
|
Tasty Malware Analysis with T.A.C.O.: Bringing Cuckoo Reports into IDA Pro |
Jason Jones |
|
||
|
A Practical Robust Mitigation and Testing Tool for Use-After-Free Vulnerabilities |
Yves Younan |
|
||
|
Testing TLS - How To Check If Your TLS Implementation Is Correct |
Hubert Kario |
|
||
|
Hack NFC Access Cards & Steal Credit Card Data with Android For Fun &Profit |
Babil Golam Sarwar |
|
Not available |
|
|
Hacking the Wireless World - Software Defined Radio Exploits |
Balint Seeber |
|
||
|
Microarchitecture Independent VM Introspection |
Shane Macaulay |
|
||
|
Spread Spectrum Satcom Hacking: Attacking the Globalstar SDS |
Colby Moore ** BY VIDEO ** |
|
Not available |

