CanSecWest 2015 March 14, 2015 to March 17, 2015, Vancouver,Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Project Zero: Making 0days Hard Ben Hawkes , Chris Evans N/A
Wolf in Sheep's Clothing: Your Next APT is Already Whitelisted Fabio Assolini , Juan Andrés Guerrero-saade N/A
Sexrets in LoadLibrary Yang Yu N/A
There's Something About WMI Devon Kerr , Christopher Glyer N/A IncludeThinkstScapes
NDIS Packet of Death: Turning Windows' Complexity Against Itself Nitay Artenstein N/A
Taming wild copies: from hopeless crash to working exploit Chris Evans In this talk, we will explore the exploitation of wild copies that lead to memory ...
I see therefore I am.... You Jan "starbug" Krissler N/A
DLL Hijacking' on OS X? #@%& Yeah! Patrick Wardle Remember DLL hijacking on Windows? Well, turns out that OS X is fundamentally vulnerable to ... IncludeThinkstScapes
Userland Exploits of Pangu 8 Team Pangu N/A
Attacking WebKit Applications by exploiting memory corruption bugs Liang Chen N/A
From baseband to bitstream and back again: What security researchers really want to do with SDR Andy Davis N/A
Credential Assessment: Mapping Privilege Escalation at Scale Matthew Weeks N/A
Bootkit via SMS: 4G access level security assessment Kirill Nesterov , Timur Yunusov - N/A
How many million BIOSes would you like to infect? Xeno Kovah , Corey Kallenberg N/A
A new class of vulnerability in SMI Handlers of BIOS/UEFI Firmware Andrew Furtak , John Loucaides This presentation will discuss security of SMI handler components of system firmware including the nature ... IncludeThinkstScapes
Attacks on UEFI Security Rafal Wojtczuk , Corey Kallenberg N/A
UEFI, Open Platforms and the Defender's Dillema Vincent Zimmer N/A
FreeSentry: Protecting against use-after-free vulnerabilities due to dangling pointers Yves Younan N/A
Memminer: Real-Time Passive Volatile Memory Inspection Inside Virtual Machines John Williams N/A