-
The CISO's Dilemma
- Saumil Shah
-
Scare: Static Code Analysis Recognition Evasion
- Andreas Wiegenstein
-
Zero To RCE In Two Days:
Exploiting Zoom On MacOS
- Michael Gianarakis and Sean Yeoh
-
Why You Should Fear Your "Mundane" Office Equipment
- Mario Rivas and Daniel Romero
-
Tick Tock - Activities Of The Tick Cyber Espionage
Group In East Asia Over The Last 10 Years
- Cha Minseok
-
4G To 5G: New Attacks
- Altaf Shaik
-
Compendium Vulnus Subestimata:
Underrated Security Bugs
- Eldar "Wireghoul" Marcussen
-
Car Hacking Made "Easel" By Car Security Quarter (CSQ)
- Alina Tan,Chun Yong,Tan Pei Si and Solomon Tan
-
Advanced Mutation Fuzzing Method For Wireless Protocols
- Lidong Li and Xianzi Kong
-
Hacking Object Detectors Is Just Like Training Neural Networks
- Jay Xiong,Tao Wei,Hao Xin,Wang Yang and Dou Goodman
-
Security Should Be Smarter Not Harder
- Katie Moussouris
-
What Species Of Fish Is This?
Malware Classification With Graph Hash
- Chia-Ching Fang and Shih-Hao Weng
-
How To Detect Fake Faces (Manipulated Images) Using CNNs
- Wang Yang,Tao Wei,Dou Goodman,Jay Xiong and Hao Xin
-
Understanding, Attacking & Securing Medical Devices
- Ajay Pratap Singh
-
Infiltrating Corporate Intranets Like The NSA:
A Pre-Auth RCE On Leading SSL VPNs
- Orange Tsai and Tingyi Chang
-
Never Gonna Give You Up, Never Gonna Let You Down
- Marc Rogers
-
Tracking Fake News Based On Deep Learning
- Zonghou Lv,Tao Wei and Dou Goodman
-
Bypassing Hardware-Based Trusted Boot
Through x86 CPU Microcode Downgrade
- Alexander Ermolov
-
Perfidious: Make PE Backdooring Great Again!
- Shreyans Doshi
-
DFEx - DNS File Exfiltration
- Emilio Couto
-
Creating A Fuzzer For
Diameter And LTE Telecom Protocols
- Sergey Mashukov
-
Abusing Over-The-Air Client Provisioning:
My SMS To Do Your Settings
- Slava Makkaveev and Artyom Skrobov
-
4G LTE Man In The Middle Attacks
With A Hacked Femtocell
- Xiaodong Zou
-
The Future Is Here:
Modern Automotive Attack Surfaces
- Lior Yaari and Yonatan Migdal
-
Launching Feedback-Driven Fuzzing On TrustZone TEE
- Andrey Akimov
-
Physical To Cyber And Back:
Fingerprint Scanner Security
- Kevin Reed
-
Recreating An iOS 0-Day Jailbreak
Out Of Apple's Security Updates
- Stefan Esser
-
Securing Cyber-Physical Systems:
Moving Beyond Fear
- Stefano Zanero
-
Prize Ceremony / Closing Note / Lock Note
- Dhillon 'L33tdawg' Kannabhiran