- POC
- 2016
- Slides
Ben Gras, “Flip Feng Shui: Hammering a Needle in the Software Stack" | | | |
Brian Pak(Cai), “Effective Patch Analysis for Microsoft Updates” |
| | |
Chen Yan, Wenyuan Xu, and Jianhao Liu, “Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-Driving Vehicles”” |
| | |
Gleb Gritsai, Sergey Gordeychik, “The Great Train Cyber Robbery” |
| | |
Keen Lab, “Hacking Phones from 2013 to 2016” |
| | |
Kevin Borgolte, “Cyber Grand Shellphish: Shellphish and the DARPA Cyber Grand Challenge” |
| | |
Maxim Goncharov, "badWPAD" |
| | |
MJ0011 & Yuki Chen, “Escape Plans: A Year's Journey with Microsoft Edge Sandbox” | | | |
Pangu, “Analysis of iOS 9.3.3 Jailbreak & Security Enhancements of iOS 10” |
| | |
Paulo Shakarian, “Scaling to the Adversary: Machine Learning Driven Mining of Threat Intel from the Darkweb” |
| | |
Petr Švenda, Peter Sekan, “The Million-Key Question – How RSA Public Key Leaks Its Origin” |
| | |
Shinjo Park, “White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphone OS and Apps” |
| | |
Su Yong Kim & SSLab, “Papa Said They Used To Find Vulnerabilities Manually...” |
| | |
Wanqiao Zhang, Lin Huang, “Forcing LTE Cellphone into Unsafe Network” |
| | |
Wei Xiao, Qinghao Tang, “qemu+kvm & xen pwn: virtual machine escape from 'Dark Portal'” |
| | |
Xpl017Elz, “New Reliable Android Kernel Root Exploitation” |
| | |
Yannay Livneh, “Exploiting PHP-7: teaching a new dog old tricks” |
| | |
http://www.powerofcommunity.net/2016.htm