Title |
Speakers |
Summary |
Topic Types |
Opening Remarks |
Collin Mulliner
,
William Enck
|
N/A |
|
dr0wned – Cyber-Physical Attack with Additive Manufacturing |
Yuval Elovici
,
Sofia Belikovetsky
,
Mark Yampolskiy
,
Jinghui Toh
,
Jacob Gatlin
|
N/A |
|
Automated PCB Reverse Engineering |
Frank Kargl
,
Stephan Kleber
,
Henrik Ferdinand Nölscher
|
N/A |
|
BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection |
Ang Cui
,
Rick Housley
|
N/A |
|
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks |
Matthias Neugschwandtner
,
Anil Kurmus
,
Nikolas Ioannou
,
Nikolaos Papandreou
,
Thomas Parnell
|
N/A |
|
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery |
Fabian "fabs" Yamaguchi
,
Konrad Rieck
,
Federico Maggi
,
Malte Skoruppa
,
Jean-pierre Seifert
,
Bhargava Shastry
,
Tommi Unruh
|
N/A |
|
One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions |
Wouter Joosen
,
Tom Van Goethem
|
N/A |
|
unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge |
Dave Levin
,
Daven Patel
,
Kevin Bock
,
George Hughey
|
N/A |
|
POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection |
Lorenzo Cavallaro
,
Johannes Kinder
,
James Patrick-evans
|
N/A |
|
Exploitations of Uninitialized Uses on macOS Sierra |
Tielei Wang
,
Hao Xu
,
Zhenquan Xu
,
Gongshen Liu
|
N/A |
|
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing |
Fabian "fabs" Yamaguchi
,
Konrad Rieck
,
Federico Maggi
,
Jean-pierre Seifert
,
Bhargava Shastry
|
N/A |
|
Software Grand Exposure: SGX Cache Attacks Are Practical |
Srdjan Capkun
,
Kari Kostiainen
,
Ahmad-reza Sadeghi
,
Alexandra Dmitrienko
,
Ferdinand Brasser
,
Urs Müller
|
N/A |
|
Stalling Live Migrations on the Cloud |
Thomas La Porta
,
Zhiyun Qian
,
Srikanth V. Krishnamurthy
,
Ahmed Atya
,
Azeem Aqil
,
Karim Khalil
|
N/A |
|
SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit |
Yuval Elovici
,
Mordechai Guri
,
Yosef Solewicz
,
Andrey Daidakulov
|
N/A |
|
Breaking and Fixing Gridcoin |
Martin Grothe
,
Tobias Niemann
,
Juraj Somorovsky
,
Jörg Schwenk
|
N/A |
|
Adversarial Example Defense: Ensembles of Weak Defenses are not Strong |
Dawn Song
,
Nicholas Carlini
,
Warren He
,
James Wei
,
Xinyun Chen
|
N/A |
|
AutoCTF: Creating Diverse Pwnables via Automated Bug Injection |
Andy Davis
,
Brendan Dolan-gavitt
,
Patrick Hulin
,
Andrew Fasano
,
Rahul Sridhar
,
Cody Gallagher
,
Aaron Sedlacek
,
Tim Leek
|
N/A |
|
Shedding too much Light on a Microcontroller's Firmware Protection |
Johannes Obermaier
,
Stefan Tatschner
|
N/A |
|
Breaking (and Fixing) a Widely Used Continuous Glucose Monitoring System |
David Oswald
,
Luca Reverberi
|
N/A |
|
One Car, Two Frames: Attacks on Hitag-2 Remote Keyless Entry Systems Revisited |
Mathieu Renard
,
Ryad Benadjila
,
Chaouki Kasmi
,
José Lopes-esteves
|
N/A |
|
Shattered Trust: When Replacement Smartphone Components Attack |
Asaf Shabtai
,
Yossi Oren
,
Omer Shwartz
,
Amir Cohen
|
N/A |
|
White-Stingray: Evaluating IMSI Catchers Detection Applications |
Ravishankar Borgaonkar
,
Andrew Martin
,
Jean-pierre Seifert
,
Altaf Shaik
,
Shinjo Park
|
N/A |
|