XFocus 2013 July 22, 2013 to July 23, 2013, Bejing, China

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
RFIDler - A Software Defined RFID Reader/Writer/Emulator Adam Laurie, Software Defined Radio has been quietly revolutionising the world of RF. However, the same revolution ...
Microsoft's Counter-Zero Day Strategy part III Chengyun Chu Zero day attacks represent one of the most difficult classes of issues for both Microsoft ...
Exploiting the iOS Kernel David Wang In the iOS jailbreak evasi0n, the evad3rs team used a large arsenal of techniques in ...
Analyze massive 0day samples and malware based on DBI and taint Zheng Huang Machine analysis of unknown samples is the key technology to defend against APT attacks.In this ...
Using the Boot emulator - Bootkit detection technology Neinei Over the last two years,The boot stage attack technique has emerged a variety of complex ...
"WH-2A"Anti-Tracking Support Platform: Design & Improvement L.neteagle In recent years, some countries, organizations and commercial companies constantly accused China of "frequently launching ...
SQLi Optimization and Obfuscation Techniques Roberto Salgado This talk will present some of the newest and most advanced optimization and obfuscation techniques ...
Forgotten Art of Basic Network Penetration Testing Ryan Baxendale As security researchers we thrive on discovering new and cutting edge methods of breaking down ...
DEP/ASLR bypass without ROP/JIT Tk This talk will present an exploit technology which can almost perfectly bypass DEP and ASLR ...
Elastic Compute Cloud Security - Reflections and Prospects Xingguo Wei This topic will give a detail introduction about the following points: the security risks of ...
Analysis of 3D printing security attacks Xiao Zi Hang Recently two years, 3D printing technology has caused widespread concern. With emergence of the hardware ...