| Presentation | Speaker | Slides | ||
|---|---|---|---|---|
|
TLS Under Siege - A Bug Hunter’s Perspective |
Neel Mehta |
|
||
|
Cellular Exploitation on a Global Scale: The Rise & Fall of the Control Protocol |
Mathew Solnik |
|
||
|
Extreme Privilege Escalation on Windows 8/UEFI Systems |
Corey Kallenberg |
|
||
|
Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways |
Brian Gorenc |
|
||
|
iOS 8 - Containers, Sandboxes and Entitlements |
Stefan Esser |
|
Not available |
|
|
Signatures Aren't dead: Next Generation Signature-based Malware Detection |
Dr Silvio Cesare |
|
Not available |
|
|
NSA Playset: PCIe |
Joe FitzPatrick |
|
||
|
EMV Security: Cloning, Skimming & Shimming - A Practical Guide to Attack & Defence |
Mike Bond |
|
Not available |
|
|
Homebrew Incident Response |
Mimeframe & Mcgrew |
|
||
|
Smartphone Physical: The Current State of Play |
Dr Bradley Schatz |
|
Not available |
|
|
Crash & Pay: Reading, Cloning and Fuzzing RFID Payment Cards |
Peter Fillmore |
|
||
|
Intel ME: Two Years Later |
Igor Skochinsky |
|
||
|
The NSA Playset: Bluetooth Smart Attack Tools |
Mike Ryan |
|
Not available |
|
|
Not So Private Mode |
Kayne Naughton |
|
Not available |