Title | Track | Speakers | |
---|---|---|---|
'0x3E9 Ways to DIE'
Along the years many attempts have been made to combine static and dynamic... |
Main | ||
Abusing Silent Mitigations
In the summer of 2014, Microsoft silently introduced two new exploit... |
Main | ||
Attacking and Defending BIOS in 2015
In this presentation we will demonstrate multiple types of recently... |
Main | ||
Building a Better Bluetooth Attack Framework
Bluetooth attacks have been around for some time. Previously we did... |
Main | ||
Exploiting Out-of-Order-Execution
Given the rise in popularity of cloud computing and platform-as-a-service,... |
Main | ||
Finish Him!
For a decade from the early 90's to the early 2000's, Williams' Digital... |
Main | ||
From Silicon to Compiler
Programmable logic devices have historically been locked up behind... |
Main | ||
Glitching and Side-Channel Analysis for All
The super-cool area of side-channel power analysis and glitching attacks are... |
Main | ||
Hooking Nirvana
In this talk we will cover 5 novel instrumentation techniques that all rely... |
Main | ||
Introducing PCBRE
PCB Reverse engineering is the process of taking a physical Printed Circuit... |
Main | ||
"One font vulnerability to rule them all"
"Font rasterization software is clearly among the most desirable attack... |
Main | ||
Pandora's Cash Box: The Ghost Under Your POS
We're all used to seeing the ubiquitous cash drawer - that steel box, usually... |
Main | ||
Polyglots and Chimeras in Digital Radio Modes
Ah Matryoshkas, who doesn't like these Russian nesting dolls? But why should... |
Main | ||
Radare2, building a new IDA
We will present radare2, a free, lgpl-licenced, modular reverse engineering... |
Main | ||
Reverse Engineering Windows AFD.sys
What happens when you make a socket() call in Windows? This presentation will... |
Main | ||
Reversing the Nintendo 64 CIC
This presentation covers our successful efforts to reverse engineer and clone... |
Main | ||
The M/o/Vfuscator
Based on a paper that proves that the "mov" instruction is Turing complete,... |
Main | ||
This Time Font hunt you down in 4 bytes
In our recent work we targeted also win32k, what seems to be fruit giving... |
Main | ||
Totally Spies!
For some months now, there were rumors of cartoon-named malware employed in... |
Main | ||
Towards Transparent Dynamic Binary Instrumentation using Virtual Machine Introspection
The idea is simple enough: Binary instrumentation as done by DynamoRIO and... |
Main | ||
Understaning the Microsoft Office Protected-View Sandbox
The first part of this talk will sketch the Protected-View sandbox internals... |
Main |