Presentation | Speaker | Slides | ||
---|---|---|---|---|
The .NET Inter-Operability Operation |
James Forshaw |
![]() |
||
Spring Dragon APT- A Case Study Of Targeted Attacks on APAC Countries |
Noushin Shabab |
![]() |
||
Leveraging VMware's RPC Interface for Fun and Profit |
ZDI Team |
![]() |
||
Modern Reconnaissance Phase by APT – Protection Layer |
Paul Rascagneres & Warren Mercer |
![]() |
Not available |
|
Trick or XFLTReaT a.k.a. Tunnel All the Things |
Balazs Bucsay |
![]() |
Not available |
|
How I Generically Bypassed CFG |
Yang Junfeng (@bluerust) |
![]() |
Not available |
|
Chasing Ghosts In The Wires |
Vitaly Kamluk |
![]() |
Not available |
|
A Ghost from Postscript |
Yu Hong (Redrain) & Min (Spark) Zheng |
![]() |
||
Neural Blacklist: Fighting Mutating Polymorphic URLs |
Sean Park (Sparky) |
![]() |
||
Look! Ransomware Is There: Large Scale Ransomware Detection with Naked Eye |
Hsien-De Huang & Chia-Mu Yu |
![]() |
Not available |
|
In Soviet Russia, Radare2 Debugs You! |
John Bird |
![]() |
||
A Whole New Efficient Fuzzing Strategy for Stagefright: Porting and Optimizations |
Zinuo Han |
![]() |
||
Hacking SkyNet - Anatomy of an intelligent Industrial Control System |
Aaron Fenwick (multiplex3r) |
![]() |
||
HODOR: Holding Open Doors and Often Reconnecting |
Ryan Holeman & Alek Amrani |
![]() |
Not available |
|
The Active Directory Botnet |
Ty Miller & Paul Kalinin |
![]() |
||
The many Dimensions of Relationships |
Tim Kornau |
![]() |
Not available |
|
Attacker Antics: Illustrations of Ingenuity |
Byrne Ghavalas & Bartosz Inglot |
![]() |
||
Executives In The Red |
Wayne Ronaldson |
![]() |
Not available |
|
Embedding Defense in Server-Side Applications |
Fernando Arnaboldi |
![]() |
||
Comparison and Improvements for Existing Jump Oriented Programming Tools |
John Dunlap |
![]() |
||
Improving Privacy on the Web |
Paul Theriault |
![]() |
Not available |
|
One-click Browser Defense |
Brandon Dixon |
![]() |
||
User Session Recording - An Open Source Solution |
Fraser Tweedale |
![]() |
||
The Mechanized Analyst |
Steve Ginty |
![]() |
Not available |
|
Privacy and Big Data |
Dr Vanessa Teague & Chris Culname |
![]() |
Not available |
|
Some Attack Surfaces For Telematics Hardware |
Minrui Yan & Mingge Cao |
![]() |
Not available |
|
TBA |
|
Not available |
||
TBA |
|
Not available |