TyphoonCon 2022 June 23, 2022 to June 24, 2022, Seoul, South Korea

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Open Source Vulnerability discovery Professor Heejo Lee Open source software (OSS) plays an important role for business innovation by adapting cutting edge ...
what happens on your mac stays on apple's Icloud? Wojciech Reguła In this talk I will: * describe how macOS privacy mechanisms work * analyze macOS ...
PWN2own'ing your Router Over the Internet Pedro Domanski Hacking through the WAN (Wide Area Network) interface of a consumer or enterprise network router ...
Large Scale security analysis of IOT firmware Daniel Nussko Today, the number of IoT devices in both the private and corporate sectors are steadily ...
Pawing Azure Storage Sharath Kumar Ramadas Azure Storage is the widely used service in Azure cloud. Organisations leverage Azure Storage for ...
DIY Cellular Tracking in the Modern World Yongdae Kim Abstract: In 2012, my group showed that an attacker can check if a victim is ...
DeepLinks can be spyware friends: Analyzing the dangerous role of deep links Rahul Kankrale App developers set up android deep links to navigate users in the app’s specific part ...
Using a magic wand to break the Iphones last security barrier Tihmstar In this talk, tihmstar will present his newest research on attacking the iPhone’s hardware AES ...
PHPWN Generic remote exploit techniques for the PHP allocator and 0Days Charles Fol Although PHP has always been deemed insecure, finding and remotely exploiting binary bugs in its ...
Jailbreaking Ios in the post-apocalilptic era @coolstar Anonomous) This talk will be showcasing the work @coolStar and @tihmstar performed on jailbreaking iOS via ...
New RCE Method Hash Manipulation on webapp via DPKG Mehmet Onder Key In most web applications, uploading harmful files is allowed with the precautions taken in the ...
Injecting Data and Code into signed executubles Alex Kojenov An ability to inject custom code and data into signed executables can help bypass detection ...
Bypassing internet and Rate Limits by Committing Syns Mathy Vanhoef The talk will introduce two new network-based attacks. Both attacks can apply to any network. ...
BPF- Best Pwning Framework Sergey Ivanov In recent years eBPF became the most rapidly growing subsystem in Linux kernel. At the ...
0Day Mobile Device RCE Noam Rathaus This lighting talk will discuss a recently discovered 0day vulnerability in a widely used and ...
1 I/O ring to Rule them All Yarden Shafir inding a kernel vulnerability is great, but it’s only the first step on the way ...