SyScan360 2015 Oct. 21, 2015 to Oct. 21, 2015, beijing,china

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Remote Exploitation of an Unaltered Passenger Vehicle Chris Valasek , Charlie Miller Although the hacking of automobiles is a topic often discussed, details regarding successful attacks, if ...
GPS spoofing of UAV Yuan Jian GPS (Global Positioning System) has been put into use more than two decades and closely ...
Security Assessment of ZigBee Protocol Li Jun In the era of Internet of things (IOT) more and more objects need wireless connection. ...
Car Hacking: Witness Theory to Scary and Recover From Scare Myles Kitchen , Jianhao Liu The 105M USD penalty on FCA expedites the car hacking chaos. We are now witnessing ...
Fuzzing Android System Service by Binder Call to Escalate Privilege Guang Gong Binder is the IPC Mechanism in Android. It's used in Communication not only between processes ...
Microsoft Bounty Program: Making it to the MSRC Top 100 Jason Shirk Microsoft recently published a list of MSRC Top 100 Finders of All Time, and announced ...
Is There An EFI Monster Inside Your Apple? Pedro Vilaça A few months ago I publicly disclosed an Apple EFI firmware zero day. It was ...
Program Analysis Tools Edgar Barbosa This presentation will focus on tools for program analysis. Real tools with source code that ...
The Art of Fuzzing Without Fuzzing Ben Nagy With the growing popularity of usable guided fuzzing tools like AFL, it is time to ...
Unicorn: next generation CPU emulator framework Nguyen Anh Quynh CPU emulator is a program emulating the internal operation of a physical CPU in software. ...
Attacking VxWorks: From Stone Age to Interstellar Zhenhua Liu , Yannick Formaggio VxWorks is the world's most widely-used real-time operating system deployed in embedded systems. Its market ...