Ruxcon 2015 Oct. 24, 2015 to Oct. 25, 2015, melbourne,austrailia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
DNS AS A DEFENSE VECTOR Paul A. Vixie DNS enables everything else on the Internet -- both good and bad. By watching what ...
PURPLE TEAMING: ONE YEAR AFTER GOING FROM FULL TIME BREAKER TO PART TIME FIXER Chris Gates A little over a year ago I made the transition from external security consultant to ...
HIGH PERFORMANCE FUZZING Richard Johnson Security conference talks related to fuzzing tend to focus on distributed frameworks or new proof-of-concept ...
DESIGN, IMPLEMENTATION AND BYPASS OF THE CHAIN-OF-TRUST MODEL OF IOS Team Pangu The closed software ecosystem of iOS heavily replies on the rigorous security mechanisms of iOS. ...
THE NEW SOUTH WALES IVOTE SYSTEM: SECURITY FAILURES AND VERIFICATION FLAWS IN A LIVE ONLINE ELECTION Vanessa Teague In the world's largest-ever deployment of online voting, the iVote Internet voting system was trusted ...
MALWAIRDROP: COMPROMISING IDEVICES VIA AIRDROP Mark Dowd iOS versions prior to iOS 9 contained a nasty bug that was exploitable via AirDrop. ...
BROADCASTING YOUR ATTACK: SECURITY TESTING DAB RADIO IN CARS Andy Davis Digital Audio Broadcasting (DAB) radio receivers can be found in many new cars and are ...
WINDOWS 10: 2 STEPS FORWARD, 1 STEP BACK James Forshaw Windows 10 is shaping up to be one of the most secure consumer operating systems ...
PRACTICAL INTEL SMEP BYPASS TECHNIQUES ON LINUX Vitaly Nikolenko The Linux kernel has always been an appealing target for exploit developers due to the ...
ADVANCED SOHO ROUTER EXPLOITATION Lyon Yang In this talk we will look into how a series of 0-day vulnerabilities can be ...
WHY ATTACKER'S TOOLSETS DO WHAT THEY DO Matt Mccormack The heartwarming story of a researcher turned part-time consultant learning that many companies have the ...
SDN SECURITY David Jorm SDN is rapidly moving from R&D to production deployment, with some frightening security implications. This ...
WINDOW DRIVER ATTACK SURFACE: SOME NEW INSIGHTS Ilja van Sprundel In this presentation I intent to cover a rapid fire set of issues that commonly ...
ABUSING ADOBE READER¹S JAVASCRIPT APIS Jasiel Spelman , Matt Molinyawe Adobe Reader¹s JavaScript APIs offer a rich set of functionality for document authors. These APIs ...
HIGH-DEF FUZZING: EXPLORING VULNERABILITIES IN HDMI-CEC Joshua Smith The HDMI (High Definition Multimedia Interface) standard has gained extensive market penetration. Nearly every piece ...
VOIP WARS: DESTROYING JAR JAR LYNC Fatih Ozavci Enterprise companies are to use Microsoft Lync 2010/2013 (a.k.a Skype for Business 2015) services as ...
VENOM Jason Geffner Sit back and listen to the fascinating journey of this year’s VENOM vulnerability discovery. Learn ...
FRUIT SALAD, YUMMY YUMMY: AN ANALYSIS OF APPLEPAY Peter Fillmore Interested in what the heck ApplePay is and how it works? This talk is about ...
A PEEK UNDER THE BLUE COAT Raphaël Rigo Blue Coat ProxySG systems are widely deployed in big corporations to handle web traffic proxying ...
HACKED TO DEATH Chris Rock Want to kill someone? Get rid of your boss? Want to enjoy your life insurance ...
AUTOMATED MALWARE ANALYSIS: A BEHAVIOURAL APPROACH TO AUTOMATED UNPACKING Karl Denton With malware being developed at an alarming rate, the quicker we can analyse and classify ...
TASTY MALWARE ANALYSIS WITH T.A.C.O.: BRINGING CUCKOO REPORTS INTO IDA PRO Jason Jones Bringing run-time information into IDA is not a new concept, but has been a need ...
A PRACTICAL ROBUST MITIGATION AND TESTING TOOL FOR USE-AFTER-FREE VULNERABILITIES Yves Younan Use-after-free vulnerabilities occur when a program marks memory as free, but then subsequently tries to ...
TESTING TLS - HOW TO CHECK IF YOUR TLS IMPLEMENTATION IS CORRECT Hubert Kario While we all use TLS and depend on its security, recent stream of severe issues ...
HACK NFC ACCESS CARDS & STEAL CREDIT CARD DATA WITH ANDROID FOR FUN &PROFIT Babil Golam Sarwar Proximity dependent wireless technologies based on short range radio such as Near Field Communication (NFC) ...
HACKING THE WIRELESS WORLD - SOFTWARE DEFINED RADIO EXPLOITS Balint Seeber Ever wanted to communicate with a NASA space probe launched in 1978, or spoof a ...
MICROARCHITECTURE INDEPENDENT VM INTROSPECTION Shane "k2" Macaulay Mapping a physical memory dump back into virtual space is the first step in volatile ...