Presentation | Speaker | Slides | ||
---|---|---|---|---|
TLS Under Siege - A Bug Hunter’s Perspective |
Neel Mehta |
![]() |
||
Cellular Exploitation on a Global Scale: The Rise & Fall of the Control Protocol |
Mathew Solnik |
![]() |
||
Extreme Privilege Escalation on Windows 8/UEFI Systems |
Corey Kallenberg |
![]() |
||
Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways |
Brian Gorenc |
![]() |
||
iOS 8 - Containers, Sandboxes and Entitlements |
Stefan Esser |
![]() |
Not available |
|
Signatures Aren't dead: Next Generation Signature-based Malware Detection |
Dr Silvio Cesare |
![]() |
Not available |
|
NSA Playset: PCIe |
Joe FitzPatrick |
![]() |
||
EMV Security: Cloning, Skimming & Shimming - A Practical Guide to Attack & Defence |
Mike Bond |
![]() |
Not available |
|
Homebrew Incident Response |
Mimeframe & Mcgrew |
![]() |
||
Smartphone Physical: The Current State of Play |
Dr Bradley Schatz |
![]() |
Not available |
|
Crash & Pay: Reading, Cloning and Fuzzing RFID Payment Cards |
Peter Fillmore |
![]() |
||
Intel ME: Two Years Later |
Igor Skochinsky |
![]() |
||
The NSA Playset: Bluetooth Smart Attack Tools |
Mike Ryan |
![]() |
Not available |
|
Not So Private Mode |
Kayne Naughton |
![]() |
Not available |