ruxcon 2017 Oct. 21, 2017 to Oct. 22, 2017, melbourne,austrailia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
THE .NET INTER-OPERABILITY OPERATION James Forshaw One of the best features of the .NET runtime is its in-built ability to call ...
SPRING DRAGON APT- A CASE STUDY OF TARGETED ATTACKS ON APAC COUNTRIES Noushin Shabab n the beginning of 2017, Kaspersky Lab became aware of new activities by an APT ...
LEVERAGING VMWARE'S RPC INTERFACE FOR FUN AND PROFIT Brian Gorenc , Jasiel Spelman , Abdul-ziz Hariri Virtual machines play a crucial role in modern computing. They often are used to isolate ...
MODERN RECONNAISSANCE PHASE BY APT – PROTECTION LAYER Paul Rascagneres , Warren Mercer The Talos researchers are no stranger to APT attacks. During recent research, we observed how ...
TRICK OR XFLTREAT A.K.A. TUNNEL ALL THE THINGS Balazs Bucsay This presentation will sum up how to do tunnelling with different protocols and will have ...
HOW I GENERICALLY BYPASSED CFG Yang Junfeng Over the years, Microsoft has introduced many forms of exploit mitigation in an effort to ...
CHASING GHOSTS IN THE WIRES Vitaly Kamluk Kaspersky Lab research team has spent almost a year tracking an ellusive threat actor that ...
A GHOST FROM POSTSCRIPT Min Zheng , Yu Hong PostScript is a programming language introduced by Adobe for image and text printing. Although this ...
NEURAL BLACKLIST: FIGHTING MUTATING POLYMORPHIC URLS Sean Park Latest malware attacks use more and more polymorphic URLs to reduce the chance of being ...
LOOK! RANSOMWARE IS THERE: LARGE SCALE RANSOMWARE DETECTION WITH NAKED EYE Hsien-de Huang , Chia-mu Yu Ransomware such as WannaCrypt and Petya have caused significant financial loss and even have endangered ...
IN SOVIET RUSSIA, RADARE2 DEBUGS YOU! John Bird This talk will be all about Radare2 - one of the new reversing/debugging/code analysis offerings ...
A WHOLE NEW EFFICIENT FUZZING STRATEGY FOR STAGEFRIGHT: PORTING AND OPTIMIZATIONS Zinuo Han In this presentation, I will present how I found several critical vulnerabilities in Stagefright media ...
HACKING SKYNET - ANATOMY OF AN INTELLIGENT INDUSTRIAL CONTROL SYSTEM Aaron Fenwick ANATOMY OF AN INTELLIGENT INDUSTRIAL CONTROL SYSTEM
HODOR: HOLDING OPEN DOORS AND OFTEN RECONNECTING Alek Amrani , Ryan Holeman Finding or obtaining user credentials is a fairly simple task and can be done in ...
THE ACTIVE DIRECTORY BOTNET Ty Miller , Paul Kalinin Botnets and C&C servers are taking over the internet and are a major threat to ...
THE MANY DIMENSIONS OF RELATIONSHIPS Tim Kornau A presentation about how to use fuzzy executable and function similarity at scale. We will ...
ATTACKER ANTICS: ILLUSTRATIONS OF INGENUITY Byrne Ghavalas , Bartosz Inglot The arms race between the vendors creating security defences and the hackers trying to defeat ...
EXECUTIVES IN THE RED Wayne Ronaldson Red Teams are designed to penetrate security in a real world test of effectiveness of ...
EMBEDDING DEFENSE IN SERVER-SIDE APPLICATIONS Fernando Arnaboldi Applications often rely on secure development practices and third-party defense mechanisms for protection. Whenever an ...
COMPARISON AND IMPROVEMENTS FOR EXISTING JUMP ORIENTED PROGRAMMING TOOLS John Dunlap Return Oriented Programming is the go-to method for bypassing modern software memory protections. Mitigations from ...
IMPROVING PRIVACY ON THE WEB Paul Theriault In this presentation we’ll review the current state of web privacy and discuss experimental browser ...
ONE-CLICK BROWSER DEFENSE Brandon Dixon When thinking of modern attacks, the web browser is still one of the top delivery ...
USER SESSION RECORDING - AN OPEN SOURCE SOLUTION Fraser Tweedale For Open Source software to conquer the enterprise, we need to play along with government ...
THE MECHANIZED ANALYST Steve Ginty The latest buzzword to make its way into our security community is “AI” (artificial intelligence), ...
PRIVACY AND BIG DATA Vanessa Teague , Chris Culname We'll describe our analysis of open Opal Data, commissioned by Transport NSW. The data treatment ...