Syscan 2015 March 21, 2015 to March 27, 2015, Merchant Court,Singapore
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Opening and Welcome Address | Thomas Lim | N/A | |
Got Root? Compromising OSX | Ian Beer | You’ve popped a renderer on OS X. Now what? I’ve spent a good chunk of ... | |
Crash & Pay: Owning and Cloning NFC Payment cards | Peter Fillmore | With all this talk about NFC payments - why can't these cards being cloned? This ... | |
A Link to the Past: Abusing Symbolic Links on Windows | James Forshaw | The dangers of symbolic links are well known on Unix-like operating systems. Through their misuse ... | |
A peek under the Blue Coat | Raphaël Rigo | Blue Coat ProxySG systems are widely deployed in big corporations to handle web traffic proxying ... | |
Finding and exploiting novel flaws in Java software | David Jorm | This presentation will introduce a range of poorly-known and novel attack vectors in Java applications. ... | |
Abusing IE Elevation Policy: Practical Sandbox Escape of IE with Protected Mode | Trimo | Recently, most operating systems and applications have sandbox mechanisms to protect the systems from attackers. ... | |
Attacks on telecom operators and mobile subscribers using SS7: from DoS to call interception | Dmitry Kurbatov | Lately, phone communication records can be found in the Internet and even be heard on ... | |
iOS 678 Security - A Study in Fail | Stefan Esser | With the release of iOS 6 that came with a large number of new security ... | |
How to own any windows network via group policy hijacking attacks | Luke Jennings | Group Policy is a key central management technology component of Microsoft Windows domain-based networks. Its ... | IncludeThinkstScapes |
HARES: Hardened Anti-Reverse Engineering System | Jacob Torrey | I propose presenting my work: Hardened Anti-Reverse Engineering System (HARES), a prototype anti-reverse engineering technique ... | |
Shooting Elephants | Marion Marschalek | As malware reverse engineer one writes the fanciest software documentations. A former malware author once ... | |
Fear & Loathing in the Dark Net | Greg Jones | The talk will discuss: - current Dark Net technologies - intelligence gleaned from our research ... | |
Caring Less - De-humanizing Human Vulnerability Assessment | Laura Bell | We are on the whole, wired to be nice people. I have a real problem ... | |
Stegosploit - Hacking with Pictures | Saumil Udayan Shah | "A good exploit is one that is delivered in style". My work over the past ... | |
Cryptographic backdooring | Jean-Philippe Aumasson | This talk is about cryptographic backdoors, which despite all the discussions that followed Snowden's publications ... | IncludeThinkstScapes |
Fuzz in Black-Box like a Merlion! | Fabien Duchene | Fuzzing is an active testing technique which consists in automatically generating and sending malicious inputs ... | |
Ring 0 to Ring -1 Exploitation with Hyper-V IPC | Alex Ionescu | 2015 will finally be the year of virtualization on the desktop. With Intel's Haswell processor ... | |
BadXNU, a rotten apple! | Pedro Vilaça | Your latest OS X 0day exploit got you root and now what? Apple (finally) introduced ... | |
Back to the Core | Peter Hlavaty | In order to harden kernel exploitation as much as possible was introduced variety of features ... |