Powerofcommunity 2017 Nov. 8, 2017 to Nov. 9, 2017, Seoul, Korea

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
1-Day Browser and Kernel Exploitation Andrew Wesie Browsers remain a ripe source of vulnerabilities, with 80+ CVEs during 2017 for Microsoft Edge ...
MMU Magic in JavaScript: Breaking ASLR from a Sandbox Ben Gras This talk presents a novel cache side-channel attack on the memory management unit (MMU) of ...
Fuzzing AOSP for the Masses Dan Austin Android is a complex system, and, as a complex system, it will have bugs. Some ...
How to cook Cisco. The exploit development for Cisco IOS George Nosenko In his talk, he is going to describe the steps to execute an arbitrary code ...
Hybrid App Security:Attack and defense Huiyu Wu hybrid application is one that combines elements of both native and Web applications. Nowadays, working ...
Playing with IE11 ActiveX 0days James Lee ActiveX is a feature that has been present on Internet Explorer almost since its inception. ...
From Zer0 to Persistence: A Complete Exploit Chain against Samsung Galaxy Series Jeff Chao Samsung Knox Active Protection provides many protection to against unauthorized changed on its devices. Especially, ...
Exposing Vulnerabilities in Deep Learning Frameworks Kang Li Advance in deep learning algorithms overshadows their security risk in software implementations. This presentation discloses ...
A Hacking and Security Story from Post iOS 10 to 11 Liang Chen N/A
Hacking Robots Before Skynet Cesar Cerrudo , Lucas Apa Robots are going mainstream. In the very near future robots will be everywhere, on military ...
We Can Wipe Your Email!! Max Goncharov , Ilya Nesterov One of the central points of failure is an email address. We used to get ...
Hack your body, one implant at a time Patrick Paumen I'll show and demonstrate how I use my 9 RFID & RFID/NFC tag implants to ...
FruitFly & Friends Patrick Wardle For better or worse, now is great time to be a Mac malware analyst! 2017 ...
An awesome toolkit for testing the virtualization system Qinghao Tang The public cloud and private cloud have become the infrastructure of high-tech enterprises, and I ...
Deluge – How to generate 2TB/s reflection DDoS data flow via a family network Shengbao Cai , Zhang Lu , Li Fu DDOS is the most prominent security threat the internet network facing now. Among all DDOS ...
7 sins of ATM protection against logical attacks Tim Yunusov , Yar Babin Everyone is perfectly familiar with logical and black-box attacks on ATMs. But hardly any countermeasures ...
Javascript Fuzzing Jeonghoon Shin This presentation will show how to find browser bug via fuzzing. It will focus on ...
Tampering with Encrypted Memory Blocks of Trusted Execution Environment Yeongjin Jang N/A
The android vulnerability discovery in SoC Yu Pan , Yang Dai , Ye Zhou We are focusing on the Android driver research and found all vendor's vulnerability,including Qualcomm,MediaTek,NVIDIA,Samsung exynos,Huawei ...