2022-08-22 | How Adversary Emulation Can Enhance Blue Team Performance SHANG DE Jiang | 0:00 | 1 | |
|
2022-08-22 | VIRTUAL LAB Qiling Framework Build a Fuzzer Based on a 1day Bug Lau Kai Jern | 0:00 | 23 | |
|
2022-08-22 | How to Hack Medical Imaging Applications via DICOM Maria Nedyak | 0:00 | 91 | |
|
2022-08-22 | HTTP Statuses as C2 Commands and Compromised TLS Denis Legezo | 0:00 | 3 | |
|
2022-08-22 | KEYNOTE 1 How Hardware Boundaries Define Platform Security Alex Matrosov | 0:00 | 3 | |
|
2022-08-22 | KEYNOTE 2 DevSecOps, Chaos Security, and Not Being Left Behind Eddie Schwartz | 0:00 | 2 | |
|
2022-08-22 | Operation SemiChimera Bletchley Chen, Inndy Lin & SHANG DE Jiang | 0:00 | 4 | |
|
2022-08-22 | Python for Enhanced OPSEC Joe Gray | 0:00 | 18 | |
|
2022-08-22 | Runtime Memory Analysis Tool for Mobile Apps I Lyrchikov & E Saltykov | 0:00 | 4 | |
|
2022-08-22 | Secret Flaws of In DRAM RowHammer Mitigations E Vannacci & P Frigo | 0:00 | 6 | |
|
2022-08-22 | Serverless Security Attack & Defense Pawel Rzepa | 0:00 | 10 | |
|
2022-08-22 | COMMSEC Breaking Siemens SIMATIC S7 PLC Protection Mechanism Gao Jian | 0:00 | 129 | |
|
2022-08-22 | HATS Interview with Sean Chen & Cory Tseng of Panasonic Security Lab | 0:00 | 2 | |
|
2022-08-22 | A Journey Into Synology NAS Q C | 0:00 | 16 | |
|
2022-08-22 | COMMSEC Exploitation With Shell Reverse & Infection With PowerShell Filipi Pires | 0:00 | 6 | |
|
2022-08-22 | A QEMU Black Box Escape Via USB Device Lingni Kong, Yanyu Zhang & Haipeng Qu | 0:00 | 9 | |
|
2022-08-22 | COMMSEC JARM Randomizer Evading JARM Fingerprinting Dagmawi Mulugeta | 0:00 | 20 | |
|
2022-08-22 | Attacking Cloud Native Kubernetes With CDK Zebin Zhou and Yue Xu | 0:00 | 7 | |
|
2022-08-22 | COMMSEC Model Robustness Will Hurt Data Privacy Jiqiang Gao and Mengyun Tang | 0:00 | 3 | |
|
2022-08-22 | Attacking Fast Charging Electric Vehicles Wu HuiYu and YuXiang Li | 0:00 | 6 | |
|
2022-08-22 | COMMSEC One Stop Anomaly Shop Andrei Cotaie and Tiberiu Boros | 0:00 | 3 | |
|
2022-08-22 | Binary Fuzzing With Snapshot Assisted Driven Comparison Branch Analysis K Son | 0:00 | 12 | |
|
2022-08-22 | COMMSEC OPENING Shaping The Future Of The 0Day Market Andrea Zapparoli Manzoni | 0:00 | 2 | |
|
2022-08-22 | Bypassing DEP With Jump Oriented Programming B Brizendine and A Babcock | 0:00 | 8 | |
|
2022-08-22 | COMMSEC The History Of Adversarial AI by Alex Polyakov and Eugene Neelou | 0:00 | 17 | |
|
2022-08-22 | Dissecting Phishing Techniques Of CloudDragon APT Linda Kuo & Zih Cing Liao | 0:00 | 27 | |
|
2022-08-22 | Closing Note by Dhillon @l33tdawg Kannabhiran | 0:00 | 0 | |
|
2022-08-22 | Exploiting QSEE, The Raelize Way Cristofaro Mune and Niek Timmers | 0:00 | 5 | |
|
2022-08-22 | COMMSEC 5G Networks And Interconnect Threats Martin Kacer | 0:00 | 27 | |
|
2022-08-22 | COMMSEC AWS GuardDuty Post DNS Era Covert Channel For C&C Sze Siong Teo | 0:00 | 6 | |
|
2022-08-22 | Grid Computing Attacks On Streaming Services Yoon, Myeong, Hwang, Yun & Kim | 0:00 | 5 | |
|
2022-08-22 | Hack Out Of The Box Discovering 10 Vulnerabilities In VirtualBox Chen Nan | 0:00 | 14 | |
|
2022-08-22 | HATS Ask Me Anything with Andrea Zapparoli Manzoni from Crowdfense | 0:00 | 6 | |
|
2022-08-22 | HATS Catch Up With Edwin van Andel | 0:00 | 0 | |
|
2022-08-22 | HATS Catch up with Ero Carrera and Sergey Lozhkin | 0:00 | 4 | |
|
2022-08-22 | HATS Catch up with Kevin Gallerin of Yes We Hack | 0:00 | 29 | |
|
2022-08-21 | Panic On The Streets Of Amsterdam PanicXNU 3 0 Juwei Lin and Junzhi Lu | 0:00 | 20 | |
|
2022-08-21 | WiCy Monitoring 802 11AC Networks At Scale Vivek Ramachandran | 0:00 | 11 | |
|
2022-08-21 | TOCTOU Attacks Against Secure Boot And BootGuard Trammell Hudson & Peter Bosch | 0:00 | 33 | |
|
2022-08-21 | PatrOwl The Red Flavour Of SOC Automation And Orchestration Nicolas Mattiocco | 0:00 | 6 | |
|
2022-08-21 | V1 Bounty Building A Coordinated Bug Disclosure Bridge For The EU Benjamin Kunz | 0:00 | 7 | |
|
2022-08-21 | PREVIEW The Beginning of the End A Return to the Abyss for a Quick Look | 0:00 | 0 | | Return to abyss 重返深渊
|
2022-08-21 | PREVIEW The End Is The Beginning Is The End Ten Years In The NL Box | 0:00 | 0 | |
|
2022-08-21 | Researching New Attack Interfaces On iOS And OSX Lilang Wu and Moony Li | 0:00 | 7 | |
|
2022-08-21 | Reverse Engineering Custom ASICs By Exploiting Supply Chain Leaks Thomas Weber | 0:00 | 12 | |
|
2022-08-21 | Reversing Cryptographic Primitives Using Quantum Computing Renaud Lifchitz | 0:00 | 280 | |
|
2022-08-21 | Reversing Mobile Malware Abdullah Joseph | 0:00 | 6 | |
|
2022-08-21 | Rise Of The WarPi Kevin McPeake | 0:00 | 6 | |
|
2022-08-21 | Secure And Scalable Anomaly Based Network Intrusion Detection Philipp Mieden | 0:00 | 24 | |
|
2022-08-21 | Sneaking Past Device Guard Philip Tsukerman | 0:00 | 1 | |
|
2022-08-21 | Social Networks Can We Fix Them Joel Hernandez | 0:00 | 0 | |
|
2022-08-21 | The Beginning Of The End A Return To The Abyss For A Quick Look R Thieme | 0:00 | 1 | |
|
2022-08-21 | The Birdman Hacking Cospas Sarsat Satellites Hao Jingli | 0:00 | 16 | |
|
2022-08-21 | AI HIGHLIGHT Advances In The Trinity Of AI Anima Anandkumar | 0:00 | 19 | |
|
2022-08-21 | QUANTUM HIGHLIGHT Panel Discussion M Manzano, Y Allain, N Aaraj and J Ignacio | 0:00 | 24 | |
|
2022-08-21 | The Sum Of All Fears, When ICS SCADA Are Compromised Mars Cheng | 0:00 | 79 | | The Sum of All Fears
|
2022-08-21 | Reimplementing Local RPC In Net James Forshaw | 0:00 | 45 | |
|
2022-08-21 | DCART Decoupled Components For Automated Ransomware Testing Mark Mager | 0:00 | 6 | |
|
2022-08-21 | AI HIGHLIGHT Reputation Systems Against Social Engineering Anton Kolonin | 0:00 | 3 | |
|
2022-08-21 | Debunking Fault Injection Myths And Misconceptions C Mune and N Timmers | 0:00 | 21 | |
|
2022-08-21 | Ridiculous Radios Michael Ossmann | 0:00 | 118 | |
|
2022-08-21 | An Open Source Toolkit For Model Based Fuzzing Of ARM CPUs Jared Wright | 0:00 | 13 | |
|
2022-08-21 | RIDL Rogue In Flight Data Load Stephan van Schaik and Sebastian Osterlund | 0:00 | 6 | |
|
2022-08-21 | Detecting Attacks In Ethereum Smart Contracts N Quoc Bao and N Anh Quynh | 0:00 | 3 | |
|
2022-08-21 | BLOCKCHAIN HIGHLIGHT BCM Secure Messaging By Hackers For Hackers KunZhe Chai | 0:00 | 6 | |
|
2022-08-21 | BLOCKCHAIN HIGHLIGHT Security Enabling Blockchains Paul Makowski | 0:00 | 0 | |
|
2022-08-21 | The Road to Building Defendable Systems Saumil Shah | 0:00 | 3 | |
|
2022-08-21 | EOS Hackers New Bank Vic Huang | 0:00 | 16 | |
|
2022-08-21 | Fuzzing Farm Monoculture Antipatterns Marc Schoenefeld | 0:00 | 33 | |
|
2022-08-21 | BLOCKCHAIN HIGHLIGHT The Impact Of Blockchain And Cryptocurrencies Gerard Dache | 0:00 | 5 | |
|
2022-08-21 | Hunting Threats In Social Media Networks F Yarochkin and V Kropotov | 0:00 | 3 | |
|
2022-08-21 | Car Hacking Practical Guide To Automotive Security Yogesh Ojha | 0:00 | 52 | |
|
2022-08-21 | Introducing ARM X The ARM IoT Firmware Emulation Framework Saumil Shah | 0:00 | 118 | |
|
2022-08-21 | COMMSEC HIGHLIGHT Are You Insured Around Cyber Crime Jake Kouns | 0:00 | 3 | |
|
2022-08-21 | KEYNOTE How Hacking Has Changed The Modern Battlefield Marc Rogers | 0:00 | 34 | |
|
2022-08-21 | COMMSEC HIGHLIGHT Cloud Computings Appeal Is Cloud Secs Complexity Nils Puhlmann | 0:00 | 9 | |
|
2022-08-21 | KEYNOTE Security Is Already Here Its Just Not Evenly Distributed Chris Wysopal | 0:00 | 4 | |
|
2022-08-21 | COMMSEC HIGHLIGHT Government At The Center Of A Cyber Battle H E Mohammed Gheyath | 0:00 | 6 | |
|
2022-08-20 | CyptoAPT APT Attacks On Crypto Exchange Employees Heungsoo Kang | 0:00 | 12 | |
|
2022-08-20 | KEYNOTE We Hacked The Planet Now What Katie Moussouris | 0:00 | 13 | |
|
2022-08-20 | LoRaWAN Auditing E Martínez Fayó, M Sequeira and C Cerrudo | 0:00 | 16 | |
|
2022-08-20 | Open Source Security Vulnerabilities Never Come Alone Fermin J Serna | 0:00 | 43 | |
|
2022-08-20 | QUANTUM HIGHLIGHT Quantum Disruption Jose Ignacio | 0:00 | 2 | |
|
2022-08-20 | QUANTUM HIGHLIGHT What Would A Quantum Computer Do To Crypto Najwa Aaraj | 0:00 | 128 | |
|
2022-08-20 | COMMSEC BONUS Security Should Be Smarter Not Harder Katie Moussouris | 0:00 | 3 | |
|
2022-08-20 | Malware Classification With Graph Hash Chai Ching Fang and Shih Hao Weng | 0:00 | 4 | |
|
2022-08-20 | Why You Should Fear Your Mundane Office Equipment Mario Rivas and Daniel Romero | 0:00 | 9 | |
|
2022-08-20 | COMMSEC Car Hacking Made Easel Alina Tan, Chun Yong, Tan Pei Si and Solomon Tan | 0:00 | 8 | |
|
2022-08-20 | Recreating An iOS 0 Day Jailbreak Out Of Apple's Security Updates Stefan Esser | 0:00 | 39 | |
|
2022-08-20 | 4G LTE Man In The Middle Attacks With A Hacked Femtocell Xiaodong Zou | 0:00 | 2,166 | |
|
2022-08-20 | COMMSEC DFEx DNS File Exfiltration Emilio Couto | 0:00 | 4 | |
|
2022-08-20 | Scare Static Code Analysis Recognition Evasion Andreas Wiegenstein | 0:00 | 21 | |
|
2022-08-20 | 4G To 5G New Attacks Altaf Shaik | 0:00 | 36 | |
|
2022-08-20 | Understanding, Attacking & Securing Medical Devices Ajay Pratap Singh | 0:00 | 13 | |
|
2022-08-20 | A Pre Auth RCE On Leading SSL VPNs Orange Tsai and Tingyi Chang | 0:00 | 40 | |
|
2022-08-20 | COMMSEC Exploiting Zoom On MacOS Michael Gianarakis and Sean Yeoh | 0:00 | 9 | |
|
2022-08-20 | Advanced Mutation Fuzzing Method For Wireless Protocols Lidong Li and Xianzi Kong | 0:00 | 6 | |
|
2022-08-20 | COMMSEC Hacking Object Detectors Is Just Like Training Neural Networks Jay Xiong | 0:00 | 4 | |
|
2022-08-20 | Bypassing Hardware Based Trusted Boot Through x86 Downgrade Alexander Ermolov | 0:00 | 3 | |
|
2022-08-20 | COMMSEC How To Detect Fake Faces Manipulated Images Using CNNs Jay Xiong | 0:00 | 7 | |
|