PacSec 2013 Nov. 13, 2013 to Nov. 14, 2013, Tokyo,Japan

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Deeper than ever before: Exploring, Subverting, Breaking and Pivoting with NAND Flash Memory Josh m0nk Thomas Almost every device we use or rely upon during our daily lives uses NAND Flash ...
attacking microchips through the backside Starbug , Dmitry Nedospasov Most high security microchips are heavily secured against attacks through the frontside of the chip. ...
How to win Pwnium - You've got 4 months, this is where to start Ian Beer in-depth technical exposé of the attack surface of the google chrome browser from the inside. ...
Mobile Phone Baseband Exploitation in 2013: Hexagon challenges Ralf-Philipp Weinmann Exploitation of baseband vulnerabilities has become significantly harder on average. With Qualcomm having grabbed 86% ... IncludeThinkstScapes
Bypassing DDoS Mitigation Albert Hui , Tony mt Miu , Alan avenir Chung , Wai Leng Lee Over the years, the DDoS landscape is changing, becoming so advanced that attacks are hard ...
Defeating the protection mechanism on Android platform Tim Xia It is very easy to repackage android Apps with your own code and republish it ...
Fighting advanced malware using machine learning Junichi Murakami In this paper, behavioral-based detection powered by machine learning is introduced. As the result, detection ...
Defeating Signed BIOS Enforcement Xeno Kovah , Corey Kallenberg , John Butterworth The integrity of the BIOS is paramount to the security of the platform.Research such as ...
Breaking MetaTrader Boris Petrov , Alex Behar To our knowledge, we are the first to disclose any security issues within MT4, the ...
Pivoting in the Amazon Clouds Andrès Pablo Riancho From no access at all, to the company Amazon's root account, this talk will teach ...
Android games + free Wi-Fi = Privacy leak Takayuki Sugiura , Yosuke Hasegawa Most free Android apps include ads that use the webview interface. With the right permissions, ...
Compromising Industrial Facilities From 40 Miles Away Lucas Apa , Carlos mario Penagos The evolution of wireless technologies has allowed industrial automation and control systems (IACS) to become ...
Public-Private Partnership in Proactive Online Security Jeff Williams Microsoft has received criticism in the security researcher community regarding certain tactics used in the ...