grehack 2013 Nov. 15, 2013 to Nov. 15, 2013, Grenoble, France

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Tain't not enough to fuzz all the memory errors Herbert Bos In this talk, I will discuss the past, present, and future of memory errors, and ...
The many flavors of binary analysis Halvar Flake Funny bio from Syscan'13: "Halvar needs no introduction... but I'm going to give him one ...
Specialization in the malware distribution ecosystem Juan Caballero In the cybercrime ecosystem attackers have understood that tackling the entire monetization chain is a ...
Developing a Grey Hat C2 and RAT for APT Security Training and Assessment Markku-juhani Olavi Saarinen We report on the development of a Remote Access Tool (RAT) and related Command and ...
I know your MAC Address: Targeted tracking of individual using Wi-Fi Mathieu Cunche This work is about wireless communications technologies embedded in portable devices, namely Wi-Fi, Bluetooth and ...
Pre-filtering Mobile Malware with Heuristic Techniques Axelle Apvrille , Ludovic Apvrille With huge amounts of new Android applications released every day, in dozens of different marketplaces, ...
Statically Detecting Use After Free on Binary Code Laurent Mounier , Marie-laure Potet , Josselin Feist We present GUEB a static tool detecting Use after Free vulnerabilities on disassembled code. This ...
Amplification DDoS attacks with game servers Alejandro Nolla This paper describes how a DDoS amplification attack using game servers works as well as ...
Vulnerability Inheritance in Programmable Logic Controllers Reid Wightman , Eireann Leverett 200 Programmable Logic Controller (PLC) models from a variety of vendors rely on the same ...
Detecting Privacy Leaks in the RATP App: how we proceeded and what we found Claude Castelluccia , Jagdish Achara , James-douglas Lefruit , Vincent Roca We analyzed the RATP App, both Android and iOS versions, using instrumented versions of these ...
Grehack-2013-speakers-vincent roca.jpg I'm Permanent Researcher , Working At Inria , A That , In 2000-2012 , I Years , In 1997-2000 , Working 6) , In Group. We analyzed the RATP App, both Android and iOS versions, using instrumented versions of these ...
Unraveling large scale geographical distribution of vulnerable DNS servers using asynchronous I/O mechanism Ruo Ando , Yuuki Takano , Satoshi Uda The Domain Name System (DNS) has become one of the most important infrastructures of Internet. ...