Title |
Speakers |
Summary |
Topic Types |
Digging Into the Core of Boot |
Yuriy Bulygin
,
Oleksandr Bazhaniuk
|
N/A |
|
You can run, but you can’t hide |
Vlad Sabaka
|
N/A |
|
Bochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking |
Mateusz “j00ru” Jurczyk
|
N/A |
|
Fun with Sam: Inside the Surface Aggregator Module |
Alex Ionescu
|
N/A |
|
BinCAT: purrfecting binary static analysis |
Philippe Biondi
,
Raphaël Rigo
,
Xavier Mehrenberger
,
Sarah Zennou
|
N/A |
|
ZapZap! bangBang! |
Ang Cui
,
Rick Housley
|
N/A |
|
Hacking Cell Phone Embedded Systems |
Keegan Ryan
|
N/A |
|
Exporting IDA Debug Information |
Adam Schwalm
|
N/A |
|
BASS Automated Signature Synthesizer |
Mariano Graziano
,
Jonas Zaddach
|
N/A |
|
The HyperV Architecture and its Memory Manager |
Andrea Allievi
|
N/A |
|
Bubble Struggle - Call Graph Visualization with Radare2 |
Marion Marschalek
|
N/A |
|
The Lightbulb Worm - A Debriefing on Philips Hue Attacks |
Colin O’flynn
,
Eyal Ronen
|
N/A |
|
HDI PCB Netlist Recovery: a new (old) technique |
David Carne
|
N/A |
|
Miasm: reverse engineering framework |
Fabrice Desclaux
,
Camille Mougey
|
N/A |
|
FreeCalypso: a fully liberated GSM baseband |
Mychaela Falconia
|
N/A |
|
Coverage Guided Kernel Fuzzing |
Richard Johnson
|
N/A |
|
Crypton - Exposing malware’s deepest secrets |
Julia Karpin
,
Anna Dorfman
|
N/A |
|
SGX Enclave programming: common mistakes |
Michael Atlas
|
N/A |
|
MazeWalker - Enriching static malware analysis |
Yevgeniy Kulakov
|
N/A |
|
The Life-Changing Magic of IDAPython: Embedded Device Edition |
Maddie Stone
|
N/A |
|
APT3 Uncovered - The code evolution of Pirpi |
Micah Yates
|
N/A |
|