XFocus 2013 July 22, 2013 to July 23, 2013, Bejing, China
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
RFIDler - A Software Defined RFID Reader/Writer/Emulator | Adam Laurie, | Software Defined Radio has been quietly revolutionising the world of RF. However, the same revolution ... | |
Microsoft's Counter-Zero Day Strategy part III | Chengyun Chu | Zero day attacks represent one of the most difficult classes of issues for both Microsoft ... | |
Exploiting the iOS Kernel | David Wang | In the iOS jailbreak evasi0n, the evad3rs team used a large arsenal of techniques in ... | |
Analyze massive 0day samples and malware based on DBI and taint | Zheng Huang | Machine analysis of unknown samples is the key technology to defend against APT attacks.In this ... | |
Using the Boot emulator - Bootkit detection technology | Neinei | Over the last two years,The boot stage attack technique has emerged a variety of complex ... | |
"WH-2A"Anti-Tracking Support Platform: Design & Improvement | L.neteagle | In recent years, some countries, organizations and commercial companies constantly accused China of "frequently launching ... | |
SQLi Optimization and Obfuscation Techniques | Roberto Salgado | This talk will present some of the newest and most advanced optimization and obfuscation techniques ... | |
Forgotten Art of Basic Network Penetration Testing | Ryan Baxendale | As security researchers we thrive on discovering new and cutting edge methods of breaking down ... | |
DEP/ASLR bypass without ROP/JIT | Tk | This talk will present an exploit technology which can almost perfectly bypass DEP and ASLR ... | |
Elastic Compute Cloud Security - Reflections and Prospects | Xingguo Wei | This topic will give a detail introduction about the following points: the security risks of ... | |
Analysis of 3D printing security attacks | Xiao Zi Hang | Recently two years, 3D printing technology has caused widespread concern. With emergence of the hardware ... |