-
The Myths Of Software Security
- Mark Curphey
-
Welcome Note
- Matteo Beccaro
-
Poisoned Apples: Current State
Of IOS Malware Detection
- Matthias Frielingsdorf
-
XRP Raid Protector: Killing A
Critical Bug Worth 40 Billion Dollars
- Haoyu Yang
-
API Security In The
Age Of Microservices
- Ali Abdollahi
-
Upgrading Rollback
Agnostic Replay Attacks
- Carlos Gomez
-
Nakatomi Space: Lateral Movement
As L1 Post-Exploitation In OT
- Jos Wetzels
-
Windows Syscalls In Shellcode: Advanced
Techniques For Malicious Functionality
- Bramwell Brizendine
-
All You Always Wanted
To Know About AntiViruses
- Marcus Botacin
-
Your Not So “Home” Office:
SOHO Hacking At Pwn2Own
- Alex Plaskett And McCaulay Hudson
-
The Next Generation Of
Virtualization-based Obfuscators
- Tim Blazytko and Moritz Schloegel
-
Exploring JARM – An Active
TLS Fingerprinting Algorithm
- Mohamad Mokbel
-
The Lost World Of DirectComposition:
Hunting Windows Desktop Window Manager Bugs
- Zhang WangJunjie,YiSheng He and Wenyue Li
-
3 Years In China: A Tale Of Building A
REAL Full Speed Anti-Censorship Router
- KaiJern 'xwings' Lau
-
Nomadic Honeypots:
How To Create Actionable CTI
- Laurent Oudot
-
Resurrecting Zombies – Leveraging Advanced
Techniques Of DMA Reentrancy To Escape QEMU
- Ao Wang and Quan Jin
-
Bypassing Anti-Cheats And
Hacking Competitive Games
- Rohan Aggarwal
-
PANEL: The Evolution Of Learning:
What Cyber Security Training Looks Like In 2023
- Matteo Beccaro
-
PANEL DISCUSSION: IOS / OS X Security
- Tarjei Mandt,Nikias Bassen,David Wang and Joshua Hill And Dhillon 'L33tdawg' Kannabhiran
-
How MySQL Servers Can Attack YOU
- Alexander Rubin and Martin Rakhmanov
-
Automated Black-box Security
Testing Of “Smart” Embedded Devices
- Andrea Continella
-
Red Wizard – A User-friendly Infrastructure For Red Teams
- Ben Brucker
-
ChatGPT: Please Write Me A
Piece Of Polymorphic Malware
- Eran Shimony and Omer Tsarfati
-
Exploiting Inter-Process Communication
With New Desynchronization Primitives
- Martin Doyhenard
-
Feeding Gophers To Ghidra
- Max Kersten
-
Smart Speaker Shenanigans:
Making The SONOS One Sing Its Secrets
- Peter Geissler
-
Active Directory Abuse Primitives
And Operation Security
- Mars Cheng and Dexter Chen
-
LAB: Developing Malicious Kernel Drivers
- Tijme Gommers and Jan-Jaap Korpershoek
-
Compromising Garmin’s Sport Watches: A Deep Dive
Into GarminOS And Its MonkeyC Virtual Machine
- Tao Sauvage
-
Privilege Escalation Using DOP In MacOS X86-64
- Yoochan Lee,Jeongsu Choi,Junoh Lee and Sangjun Song
-
A Security Analysis Of Computer
Numerical Control Machines In Industry 4.0
- Marco Balduzzi
-
Investigating Web3 With OSINT
- Dhia Mahjoub
-
Kubernetes Security Detection Engineering:
Mapping Back To MITRE ATT&CK Matrix
- Madhu Akula
-
The Return Of Stack Overflows In The Linux Kernel
- Davide Ornaghi
-
The Hand That Strikes, Also Blocks
- Saumil Shah
-
Closing Ceremony
- Dhillon 'L33tdawg' Kannabhiran