PacSec 2015 Nov. 11, 2015 to Nov. 12, 2015, tokyo,japan

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Attacking IoT with SDR (Software Defined Radio) Jonathan Andersson Software defined radio (SDR) is an emerging technology focused on flexible radio implementation and design ...
Attacking HTTP2 Implementations John Villamil , Stuart Larsen HTTP2 is a new technology that will soon see widespread use across the internet. There ...
Criminal Hideouts for Lease: Bulletproof Hosting Services Maxim Goncharov This type of activity is one of the most important parts of almost every single ...
BlueToot / BlueProx - when Bluetooth met NFC Adam ( Major Malfunction ) Laurie This talk will cover one of the winning entries in last year's Mobile Pwn2Own, and ...
Windows 10, Elevator Action James Forshaw Windows is a fertile group for elevation of privilege vulnerabilities especially in new versions which ...
Panel discussion - Cybersecurity: Where do I start/what do I need to do? Josh Ryder , Chris Kuethe , Masakazu Takahashi Tapping into years of enterprise and cloud security experience, our panelists will talk about what ...
Warranty Void If Label Removed - Attacking MPLS Networks Georgi Geshev General MPLS and MPLS related concepts will be briefly introduced to the audience, followed by ...
The plain simple reality of entropy (Or how I learned to stop worrying and love urandom) Filippo Valsorda Entropy, the randomness used in many critical cryptography processes including key generation, is as important ...
High Performance Fuzzing Richard Johnson , Cisco Talos Security conference talks related to fuzzing tend to focus on distributed frameworks or new proof-of-concept ...
Universal Pwn n Play Martin Zeiser , Aleksandar Nikolic Universal Plug and Play (UPnP) is a protocol which is in widespread use, supported by ...
Vulnerabilities mining technology of Cloud and Virtualization platform Qinghao Tang As a key foundation of cloud computing, virtualization technology plays a more and more important ...
Exploiting Heap Corruption due to Integer Overflow in Android libcutils -- Escalate privilege by vulnerabilities in Android system services Guang Gong How to exploit CVE20151528 to get system_server permission in Android.