2022-08-18 | KEYNOTE 2 Cyber Arms Race Mikko Hypponen | 0:00 | 89 | |
|
2022-08-17 | We Broke All CSPs And You Won't Believe What Happened Spagnuolo & Weichselbaum | 0:00 | 22 | |
|
2022-08-17 | Harnessing Intel Processor Trace On Windows For Vuln Discovery Richard Johnson | 0:00 | 32 | |
|
2022-08-17 | I Got 99 Trends And A Is All Of Them Steven Seeley and Roberto Suggi Liverani | 0:00 | 73 | |
|
2022-08-17 | In Depth Analysis Of Multicast DNS And DNS Service Discovery Antonios Atlasis | 0:00 | 67 | |
|
2022-08-17 | KEYNOTE 1 Redefining Defense Saumil Shah | 0:00 | 10 | |
|
2022-08-17 | KEYNOTE 2 All Fall Down Interdependencies In The Cloud Window Snyder | 0:00 | 2 | |
|
2022-08-17 | Most Impressive A Guide To Key Impressioning Attacks Jos Weyers | 0:00 | 11 | |
|
2022-08-17 | Oversight Exposing Spies On MacOS Patrick Wardle | 0:00 | 24 | |
|
2022-08-17 | Shadow Box The Practical And Omnipotent Sandbox Seunghun Han | 0:00 | 2 | |
|
2022-08-17 | Side Channel Attacks Against iOS Crypto Libraries And More Najwa Aaraj | 0:00 | 47 | |
|
2022-08-17 | The Best Laid Schemes Attacking URL Schemes Yu Hong | 0:00 | 1 | |
|
2022-08-17 | The Secret Of Chakracore 10 Ways To Go Beyond The Edge Linan Hao and Long Liu | 0:00 | 7 | |
|
2022-08-17 | Vulnerabilities In Android Password Managers Huber, Arzt & Rasthofer | 0:00 | 4 | |
|
2022-08-17 | CommSec Execute Code On A Forensic Workstation F Lukavsky & W Ettlinger | 0:00 | 2 | |
|
2022-08-17 | CommSec Facebook The Deep & Dark Web For Threat Actors In Asia Fadli Sidek | 0:00 | 2 | |
|
2022-08-17 | CommSec Growing Network Security Specialists For Our Enterprise Xinhua Cai | 0:00 | 0 | |
|
2022-08-17 | CommSec Hadoop Safari Hunting For Vulnerabilities T Debize and M Braik | 0:00 | 4 | |
|
2022-08-17 | CommSec Insecurity In 2017 0 Days Are The Least Of Our Problems Nick Biasini | 0:00 | 1 | |
|
2022-08-17 | CommSec Intelligence And Counterintelligence Techniques J Hesse & K Ranjan | 0:00 | 32 | |
|
2022-08-17 | CommSec Its Friday Evening Professor Moriarty Nicolas Collery | 0:00 | 12 | |
|
2022-08-17 | A New Era Of SSRF Exploiting Url Parsers Orange Tsai | 0:00 | 474 | |
|
2022-08-17 | A Year In The Red Dominic Chell & Vincent Yiu | 0:00 | 41 | |
|
2022-08-17 | CLOSING KEYNOTE A Spin Around The Block 13 Years Of Infosec Challenges Kelly Lum | 0:00 | 1 | |
|
2022-08-17 | CommSec 2FAssassin Bypass 2FA, Stealing Private Keys, And More Maxwell Koh | 0:00 | 13 | |
|
2022-08-17 | CommSec 200 Vulnerabilities In Android Phones B Guangdong & Z Qing | 0:00 | 4 | |
|
2022-08-17 | CommSec Automotive Security Assessment Techniques And Tools Keisuke Hirata | 0:00 | 5 | |
|
2022-08-17 | The State Of Cyber George Kurtz | 0:00 | 6 | |
|
2022-08-17 | XFLTReaT A New Dimension In Tunnelling Balazs Bucsay | 0:00 | 6 | |
|
2022-08-17 | CommSec Searching For A Needle In A Remote Haystack Vitaly Kamluk & Wayne Lee | 0:00 | 0 | |
|
2022-08-17 | WELCOME ADDRESS IoT A Security Hole Without A Patch Earl Carter | 0:00 | 3 | |
|
2022-08-17 | CommSec Stealing PLC Intellectual Property A Red Teaming Story Matteo Beccaro | 0:00 | 5 | |
|
2022-08-17 | CommSec The Original Elevat0r History Of A Private Jailbreak Stefan Esser | 0:00 | 15 | |
|
2022-08-17 | CommSec Threat Hunting 101 Become The Hunter Hamza Beghal | 0:00 | 51 | |
|
2022-08-17 | CommSec Unstructured Data Is The New Gold ML NLP Is The New Shiz J Geovedi | 0:00 | 5 | |
|
2022-08-17 | Finding Vulns And Malware In Open Source Code At Scale Mark Curphey | 0:00 | 23 | |
|
2022-08-17 | Get To The Money Hacking PoS And PoP Systems D Chastuhin & V Egorov | 0:00 | 48 | |
|
2022-08-17 | How We Broke Intel Amt A Ermolov, D Evdokimov & M Malyutin | 0:00 | 4 | |
|
2022-08-17 | Neuralfuzz Neural Networks For Fuzzing Web Apps Ivan Novikov | 0:00 | 10 | |
|
2022-08-17 | QEMU Attack Surface And Security Internals Qiang Li & ZhiBin Hu | 0:00 | 11 | |
|
2022-08-17 | Radio Exploitation 101 Matt Knight & Marc Newlin | 0:00 | 21 | |
|
2022-08-17 | Rootten Apples Vulnerability Heaven In The iOS Sandbox Adam Donenfeld | 0:00 | 16 | | The Sandbox
|
2022-08-17 | Smart Cities Panel Discussion with M Curphey, C Cerrudo, E Schwartz & M Beccaro | 0:00 | 7 | |
|
2022-08-17 | Spy Vs Spy A Modern Study Of Microphone Bugs V Valeros & S Garcia | 0:00 | 5 | |
|
2022-08-17 | A New Fuzzing Method for Android Zhang Qing & Bai Guangdong | 0:00 | 8 | |
|
2022-08-17 | KEYNOTE 1 The Future, The Past, and Wait, Where the Hell are We Now M Marschalek | 0:00 | 5 | |
|
2022-08-17 | Welcome Address Improving Incentives for Cybersecurity Michel van Eeten | 0:00 | 2 | |
|
2022-08-17 | Abusing The Travel Industry V Kropotov, F Yarochkin, M Fuentes & L Gu | 0:00 | 1 | |
|
2022-08-17 | KEYNOTE 2 A Risk Assessment of Logo Disclosures Jennifer Leggio | 0:00 | 5 | |
|
2022-08-17 | CommSec How to Find and Exploit Bugs in IoT Devices Kelvin Wong | 0:00 | 7 | |
|
2022-08-17 | Applying Machine Learning to User Behavior Anomaly Analysis Eugene Neyolov | 0:00 | 27 | |
|
2022-08-17 | Mallet Towards a Generic Intercepting Proxy Rogan Dawes | 0:00 | 8 | |
|
2022-08-17 | CommSec Keynterceptor Press Any Key to Continue Niels van Dijkhuizen | 0:00 | 0 | |
|
2022-08-17 | CommSec ProdSec A Technical Approach Jeremy Brown | 0:00 | 14 | |
|
2022-08-17 | Over The Edge Pwning The Windows Kernel Rancho Han | 0:00 | 17 | |
|
2022-08-17 | Attacking Microsofts NET Framework Through CLR Yu Hong & Shikang Xing | 0:00 | 2 | |
|
2022-08-17 | CommSec PyREBox Making Dynamic Instrumentation Great Again X Ugarte Pedrero | 0:00 | 70 | |
|
2022-08-17 | Backdooring & Remotely Controlling Cars Sheila A Berta & Claudio Carraciolo | 0:00 | 8 | |
|
2022-08-17 | Real World Attacks Against Secure Elements Don Bailey | 0:00 | 6 | |
|
2022-08-17 | CommSec Smart Contract InSecurity Ben Schmidt | 0:00 | 12 | |
|
2022-08-17 | Brida When Burp Suite meets Frida Federico Dotta & Piergiovanni Cipolloni | 0:00 | 92 | |
|
2022-08-17 | CommSec Steganography Ante Portas Steffen Wendzel | 0:00 | 5 | |
|
2022-08-17 | CommSec The Life & Death of Kernel Object Abuse Salf ElSherei & Ian Kronquist | 0:00 | 14 | |
|
2022-08-17 | CLOSING KEYNOTE Security is What We Make of It Blockchain and Beyond Amber Baldet | 0:00 | 11 | |
|
2022-08-17 | Sandbox Evasion Using VBA Referencing Aviv Grafi & Amit Dori | 0:00 | 15 | |
|
2022-08-17 | Smashing Ethereum Smart Contracts for Fun and ACTUAL Profit Bernhard Mueller | 0:00 | 20 | |
|
2022-08-17 | CommSec A Deep Dive Into Malicious Documents Josh Stroschein | 0:00 | 4 | |
|
2022-08-17 | Covert Data Exfiltration Channel Hongjian Cao, Kunzhe Chai & Jun Li | 0:00 | 2 | |
|
2022-08-17 | CommSec An Isolated Data Center Security Policy Model Using SmartNICs Ofir Arkin | 0:00 | 6 | |
|
2022-08-17 | Defense in Depth Techniques for Modern Web Apps M Spagnuolo & L Weichselbaum | 0:00 | 1 | |
|
2022-08-17 | Techniques FOR %F IN style DO S level CMD Obfuscation Daniel Bohannon | 0:00 | 3 | |
|
2022-08-17 | Establishing Covert Channels By Abusing GSM AT Commands A Munoz & J C Saez | 0:00 | 12 | |
|
2022-08-17 | CommSec Attacking IoT Speakers Stephen Hilt | 0:00 | 5 | |
|
2022-08-17 | Uncovering the Android Patch Gap Karsten Nohl & Jakob Lell | 0:00 | 20 | |
|
2022-08-17 | CommSec Automatic Generation of ROP Chains Ricardo J Rodríguez & Daniel Uroz | 0:00 | 2 | |
|
2022-08-17 | Expanding Your WMI Lateral Movement Arsenal Philip Tsukerman | 0:00 | 13 | |
|
2022-08-17 | CommSec Behaviors and Patterns of Rogue Hosting Providers D Mahjoub & S Brown | 0:00 | 6 | |
|
2022-08-17 | Exposing Hidden Exploitable Behaviors Using EDF Fernando Arnaboldi | 0:00 | 9 | |
|
2022-08-17 | CommSec Faster, Wider, Greater Modern Pentest Tricks Thomas Debize | 0:00 | 0 | |
|
2022-08-17 | Fuzzing Javascript Engines for Fun and Pwnage Areum Lee & Jeonghoon Shin | 0:00 | 12 | |
|
2022-08-17 | CommSec Hacking a Hospital for Fun and Profit Asaf Cohen & Ofir Kamil | 0:00 | 5 | |
|
2022-08-17 | How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers X Bai & M Zheng | 0:00 | 38 | |
|
2022-08-17 | CommSec Hiding Tasks via Hardware Task Switching Kyeong Joo Jung | 0:00 | 7 | |
|
2022-08-17 | Glitch Chronicles Turning WebGL Into A Hammer Pietro Frigo | 0:00 | 10 | |
|
2022-08-17 | A Secure And Robust Wireless Comm System For Low Latency Applications Dr H Mukhtar | 0:00 | 4 | |
|
2022-08-17 | AI Model Security Reverse Engineering Machine Learning Models Kang Li | 0:00 | 17 | |
|
2022-08-17 | Attacking Industrial Wireless Mesh Networks M Van Ommeren and Erwin Paternotte | 0:00 | 7 | |
|
2022-08-17 | Auditable & Provable Privacy Of Smart Speakers Wang Kang and Yang Bo | 0:00 | 2 | |
|
2022-08-17 | Blockchain, Public Chain and Contract Security Li Jiafeng and Yang Changcheng | 0:00 | 1 | |
|
2022-08-17 | Building Security Beyond The Genesis Block Ryan Shepherd | 0:00 | 0 | |
|
2022-08-17 | Building Your Own Self Driving, Self Racing Car Dhillon 'L33tdawg' Kannabhiran | 0:00 | 1 | |
|
2022-08-17 | Capture This Real Time Packet Processing With FPGAs Matteo Collura | 0:00 | 6 | |
|
2022-08-17 | CLOSING KEYNOTE Blind Digital Signatures Dr Manar Abu Talib and Dr Qassim Nasir | 0:00 | 6 | |
|
2022-08-17 | CTF Prize Giving Closing Ceremony Locknote HitB Crew | 0:00 | 2 | |
|
2022-08-17 | DHCP Is Hard Felix Wilhelm | 0:00 | 9 | |
|
2022-08-17 | Enhancing DL DGA Detection Models Using Separate Character Embedding Vikash Yadav | 0:00 | 3 | |
|
2022-08-17 | Evolution of Security Threats To Telecommunications Infrastructures Emmanuel Gadaix | 0:00 | 13 | |
|
2022-08-17 | Extracting Messages From iCloud Vladimir Katalov | 0:00 | 24 | |
|
2022-08-17 | Hunting For Vulnerabilities In Signal Markus Vervier | 0:00 | 38 | |
|
2022-08-08 | Alfonso De Gregorio Extortion and Cooperation in the Zero day Market | 0:00 | 24 | |
|