Title | Track | Speakers | |
---|---|---|---|
![]() |
'0x3E9 Ways to DIE'
Along the years many attempts have been made to combine static and dynamic... |
Main | |
![]() |
Abusing Silent Mitigations
In the summer of 2014, Microsoft silently introduced two new exploit... |
Main | |
![]() |
Attacking and Defending BIOS in 2015
In this presentation we will demonstrate multiple types of recently... |
Main | |
![]() |
Building a Better Bluetooth Attack Framework
Bluetooth attacks have been around for some time. Previously we did... |
Main | |
![]() |
Exploiting Out-of-Order-Execution
Given the rise in popularity of cloud computing and platform-as-a-service,... |
Main | |
![]() |
Finish Him!
For a decade from the early 90's to the early 2000's, Williams' Digital... |
Main | |
![]() |
From Silicon to Compiler
Programmable logic devices have historically been locked up behind... |
Main | |
![]() |
Glitching and Side-Channel Analysis for All
The super-cool area of side-channel power analysis and glitching attacks are... |
Main | |
![]() |
Hooking Nirvana
In this talk we will cover 5 novel instrumentation techniques that all rely... |
Main | |
![]() |
Introducing PCBRE
PCB Reverse engineering is the process of taking a physical Printed Circuit... |
Main | |
![]() |
"One font vulnerability to rule them all"
"Font rasterization software is clearly among the most desirable attack... |
Main | |
![]() |
Pandora's Cash Box: The Ghost Under Your POS
We're all used to seeing the ubiquitous cash drawer - that steel box, usually... |
Main | |
![]() |
Polyglots and Chimeras in Digital Radio Modes
Ah Matryoshkas, who doesn't like these Russian nesting dolls? But why should... |
Main | |
![]() |
Radare2, building a new IDA
We will present radare2, a free, lgpl-licenced, modular reverse engineering... |
Main | |
![]() |
Reverse Engineering Windows AFD.sys
What happens when you make a socket() call in Windows? This presentation will... |
Main | |
![]() |
Reversing the Nintendo 64 CIC
This presentation covers our successful efforts to reverse engineer and clone... |
Main | |
![]() |
The M/o/Vfuscator
Based on a paper that proves that the "mov" instruction is Turing complete,... |
Main | |
![]() |
This Time Font hunt you down in 4 bytes
In our recent work we targeted also win32k, what seems to be fruit giving... |
Main | |
![]() |
Totally Spies!
For some months now, there were rumors of cartoon-named malware employed in... |
Main | |
![]() |
Towards Transparent Dynamic Binary Instrumentation using Virtual Machine Introspection
The idea is simple enough: Binary instrumentation as done by DynamoRIO and... |
Main | |
![]() |
Understaning the Microsoft Office Protected-View Sandbox
The first part of this talk will sketch the Protected-View sandbox internals... |
Main |