Infiltrate 2014 May 15, 2014 to May 16, 2014, Miami,USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Red Team Deadwood: Why Red Teams are Useless | Bill Arbaugh | N/A | |
Life at Both Ends of the Barrel: An NSA Targeting Retrospective | Richard "dickie" George | N/A | |
Hacking US Traffic Control Systems | Cesar Cerrudo | Probably many of us have seen that scene from "Live Free or Die Hard" (Die ... | |
SQL Injections to MIPS Overflows: Part Deux | Zachary Cutlip | A while back, I showed how to combine SQL injection vulnerabilities with MIPS Linux buffer ... | |
Researching Android Device Security with the Help of a Droid Army | Joshua j. Drake | In the last few years, Android has become the world's leading smart phone operating system. ... | |
Legacy Sandboxing: Escaping IE11 Enhanced Protected Mode | James Forshaw | In June 2013 Microsoft started the first of their new bug-bounty programs, focusing on finding ... | |
Ghosts of Christmas Past: Fuzzing Language Interpreters using Regression Tests | Sean Heelan | In this talk I will discuss an approach to fuzzing language interpreters that has found ... | |
Python, Deflowered: Shangrila! | Christos Kalkanis | The use of dynamic languages in sophisticated persistent frameworks is not new. In the past, ... | |
A Curious Cyber War: Business Owners vs Investors | Suzanne E. Kecmer | This presentation will discuss recent market and valuation trends of offensively-focused cyber companies. The audience ... | |
Exploiting Hyper-V | Matthias Luft , Felix Wilhelm | In this presentation we will describe our research on the architecture and security of the ... | |
Fuzzing, Reversing and Maths | Pedro Guillén Núñez , Josep Pi Rodriguez | We want to presentate several 0days using fuzzing and reverse engineering and maths. 1 Critical ... | |
Analytics, and Scalability, and UEFI exploitation! Oh My! | Teddy Reed | We use UEFI and commodity PC manufacturer "firmware" as a use case for vulnerability discovery ... | |
Digital Rights Management for Malicious Software | Paul Royal | To process and extract intelligence from large volumes of suspect executables collected in networks each ... |