Syscan 2015 March 21, 2015 to March 27, 2015, Merchant Court,Singapore

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening and Welcome Address Thomas Lim N/A
Got Root? Compromising OSX Ian Beer You’ve popped a renderer on OS X. Now what? I’ve spent a good chunk of ...
Crash & Pay: Owning and Cloning NFC Payment cards Peter Fillmore With all this talk about NFC payments - why can't these cards being cloned? This ...
A Link to the Past: Abusing Symbolic Links on Windows James Forshaw The dangers of symbolic links are well known on Unix-like operating systems. Through their misuse ...
A peek under the Blue Coat Raphaël Rigo Blue Coat ProxySG systems are widely deployed in big corporations to handle web traffic proxying ...
Finding and exploiting novel flaws in Java software David Jorm This presentation will introduce a range of poorly-known and novel attack vectors in Java applications. ...
Abusing IE Elevation Policy: Practical Sandbox Escape of IE with Protected Mode Trimo Recently, most operating systems and applications have sandbox mechanisms to protect the systems from attackers. ...
Attacks on telecom operators and mobile subscribers using SS7: from DoS to call interception Dmitry Kurbatov Lately, phone communication records can be found in the Internet and even be heard on ...
iOS 678 Security - A Study in Fail Stefan Esser With the release of iOS 6 that came with a large number of new security ...
How to own any windows network via group policy hijacking attacks Luke Jennings Group Policy is a key central management technology component of Microsoft Windows domain-based networks. Its ... IncludeThinkstScapes
HARES: Hardened Anti-Reverse Engineering System Jacob Torrey I propose presenting my work: Hardened Anti-Reverse Engineering System (HARES), a prototype anti-reverse engineering technique ...
Shooting Elephants Marion Marschalek As malware reverse engineer one writes the fanciest software documentations. A former malware author once ...
Fear & Loathing in the Dark Net Greg Jones The talk will discuss: - current Dark Net technologies - intelligence gleaned from our research ...
Caring Less - De-humanizing Human Vulnerability Assessment Laura Bell We are on the whole, wired to be nice people. I have a real problem ...
Stegosploit - Hacking with Pictures Saumil Udayan Shah "A good exploit is one that is delivered in style". My work over the past ...
Cryptographic backdooring Jean-Philippe Aumasson This talk is about cryptographic backdoors, which despite all the discussions that followed Snowden's publications ... IncludeThinkstScapes
Fuzz in Black-Box like a Merlion! Fabien Duchene Fuzzing is an active testing technique which consists in automatically generating and sending malicious inputs ...
Ring 0 to Ring -1 Exploitation with Hyper-V IPC Alex Ionescu 2015 will finally be the year of virtualization on the desktop. With Intel's Haswell processor ...
BadXNU, a rotten apple! Pedro Vilaça Your latest OS X 0day exploit got you root and now what? Apple (finally) introduced ...
Back to the Core Peter Hlavaty In order to harden kernel exploitation as much as possible was introduced variety of features ...