Presentation | Speaker | Slides | ||
---|---|---|---|---|
TLS Under Siege - A Bug Hunter’s Perspective |
Neel Mehta |
|||
Cellular Exploitation on a Global Scale: The Rise & Fall of the Control Protocol |
Mathew Solnik |
|||
Extreme Privilege Escalation on Windows 8/UEFI Systems |
Corey Kallenberg |
|||
Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways |
Brian Gorenc |
|||
iOS 8 - Containers, Sandboxes and Entitlements |
Stefan Esser |
Not available |
||
Signatures Aren't dead: Next Generation Signature-based Malware Detection |
Dr Silvio Cesare |
Not available |
||
NSA Playset: PCIe |
Joe FitzPatrick |
|||
EMV Security: Cloning, Skimming & Shimming - A Practical Guide to Attack & Defence |
Mike Bond |
Not available |
||
Homebrew Incident Response |
Mimeframe & Mcgrew |
|||
Smartphone Physical: The Current State of Play |
Dr Bradley Schatz |
Not available |
||
Crash & Pay: Reading, Cloning and Fuzzing RFID Payment Cards |
Peter Fillmore |
|||
Intel ME: Two Years Later |
Igor Skochinsky |
|||
The NSA Playset: Bluetooth Smart Attack Tools |
Mike Ryan |
Not available |
||
Not So Private Mode |
Kayne Naughton |
Not available |