Powerofcommunity 2017 Nov. 8, 2017 to Nov. 9, 2017, Seoul, Korea
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
1-Day Browser and Kernel Exploitation | Andrew Wesie | Browsers remain a ripe source of vulnerabilities, with 80+ CVEs during 2017 for Microsoft Edge ... | |
MMU Magic in JavaScript: Breaking ASLR from a Sandbox | Ben Gras | This talk presents a novel cache side-channel attack on the memory management unit (MMU) of ... | |
Fuzzing AOSP for the Masses | Dan Austin | Android is a complex system, and, as a complex system, it will have bugs. Some ... | |
How to cook Cisco. The exploit development for Cisco IOS | George Nosenko | In his talk, he is going to describe the steps to execute an arbitrary code ... | |
Hybrid App Security:Attack and defense | Huiyu Wu | hybrid application is one that combines elements of both native and Web applications. Nowadays, working ... | |
Playing with IE11 ActiveX 0days | James Lee | ActiveX is a feature that has been present on Internet Explorer almost since its inception. ... | |
From Zer0 to Persistence: A Complete Exploit Chain against Samsung Galaxy Series | Jeff Chao | Samsung Knox Active Protection provides many protection to against unauthorized changed on its devices. Especially, ... | |
Exposing Vulnerabilities in Deep Learning Frameworks | Kang Li | Advance in deep learning algorithms overshadows their security risk in software implementations. This presentation discloses ... | |
A Hacking and Security Story from Post iOS 10 to 11 | Liang Chen | N/A | |
Hacking Robots Before Skynet | Cesar Cerrudo , Lucas Apa | Robots are going mainstream. In the very near future robots will be everywhere, on military ... | |
We Can Wipe Your Email!! | Max Goncharov , Ilya Nesterov | One of the central points of failure is an email address. We used to get ... | |
Hack your body, one implant at a time | Patrick Paumen | I'll show and demonstrate how I use my 9 RFID & RFID/NFC tag implants to ... | |
FruitFly & Friends | Patrick Wardle | For better or worse, now is great time to be a Mac malware analyst! 2017 ... | |
An awesome toolkit for testing the virtualization system | Qinghao Tang | The public cloud and private cloud have become the infrastructure of high-tech enterprises, and I ... | |
Deluge – How to generate 2TB/s reflection DDoS data flow via a family network | Shengbao Cai , Zhang Lu , Li Fu | DDOS is the most prominent security threat the internet network facing now. Among all DDOS ... | |
7 sins of ATM protection against logical attacks | Tim Yunusov , Yar Babin | Everyone is perfectly familiar with logical and black-box attacks on ATMs. But hardly any countermeasures ... | |
Javascript Fuzzing | Jeonghoon Shin | This presentation will show how to find browser bug via fuzzing. It will focus on ... | |
Tampering with Encrypted Memory Blocks of Trusted Execution Environment | Yeongjin Jang | N/A | |
The android vulnerability discovery in SoC | Yu Pan , Yang Dai , Ye Zhou | We are focusing on the Android driver research and found all vendor's vulnerability,including Qualcomm,MediaTek,NVIDIA,Samsung exynos,Huawei ... |