-
Hardware Security Is Hard: How Hardware
Boundaries Define Platform Security
- Alex Matrosov
-
The Dojo Of Blue: How Adversary Emulator
Can Enhance Blue Team Performance
- SHANG-DE Jiang
-
Breakout Script Of The Westworld
- Tianwen Tang and Wei Xiao
-
SIGNAL Processing With GNURadio And SDRs
- Ateet Kumar
-
The Secret Codes Tell The Secrets
- Zhang Qing and Bai Guangdong
-
Exploring And Exploiting The SQLite:
How We Find More Bugs By Targeted Fuzzing
- Wenxiang Qian
-
Virtual Lab: Car Hacking Day 1
- Alina,Edmund,Tan Pei Si and Chun Yong
-
Qiling Framework:
Learn How To Build A Fuzzer Based On A 1-Day Bug
- Lau Kai Jern,Ding Tian Zhe,Yu Tong and Sun Bo Wen
-
A Journey Into The Secret Flaws
Of In-DRAM RowHammer Mitigations
- Emanuele Vannacci and Pietro Frigo
-
Kernel Hijacking Is Not An Option:
MemoryRanger To The Rescue
- Igor Korkin
-
Zen: A Complex Campaign
Of Harmful Android Apps
- Ćukasz Siewierski
-
How To Hack Medical Imaging
Applications Via DICOM
- Maria Nedyak
-
FIDLing With Decompilers
- Carlos Garcia Prado and Ryan Warns
-
Runtime Memory Analysis Tool
For Mobile Applications
- Igor Lyrchikov & Egor Saltykov
-
Operation SemiChimera:
APT Operation Targets Semiconductor Vendors
- Bletchley Chen and Inndy Lin & SHANG-DE Jiang
-
A DECEPTICON And AUTOBOT Walk Into A Bar:
Python For Enhanced OPSEC
- Joe Gray
-
AWS Lambda Security: Attack & Defense
- Pawel Rzepa
-
From Authors Of COMPFun: HTTP Statuses
As C2 Commands And Compromised TLS
- Denis Legezo
-
Are We Far-Enough To The Left Yet? DevSecOps,
Chaos Security, And Not Being Left Behind
- Eddie Schwartz
-
Public And Private, Common
Flaws In ICS Network Protocols
- Mars Cheng and Selmon Yang
-
Exploring Deficiencies In The State-Of-The-Art
Automatic Software Vulnerability Mining Technologies
- Wish Wu
-
Swapping Asprin Formulas With MDMA
While Red Teaming A Billion Dollar Company
- Himanshu Sharma and Aman Sachdev
-
Virtual Lab: Car Hacking Day 2
- Alina,Edmund,Tan Pei Si and Chun Yong
-
Qiling Framework:
Learn How To Build A Fuzzer Based On A 1-Day Bug
- Lau Kai Jern,Ding Tian Zhe,Yu Tong and Sun Bo Wen
-
Clandestine Hunter:
Two Strategies For Supply Chain Attacks
- Byeongjae Kim and Taewoo Lee
-
A Review Of Modern Code
Deobfuscation Techniques
- Arnau Gamez Montolio
-
SAP RCE : The Agent Who Spoke Too Much
- Yvan Genuer
-
Hacking The DevOps Butler:
From Nothing To Admin
- Nimrod Stoler
-
The Weakest Element Of
Acquiring Bank Infrastructure
- Ilia Bulatov and Gleb Cherbov
-
PayDay:
Jackpotting Fortune-500 Treasuries
- Martin Doyhenard and Gaston Traberg
-
The Fragile Art Of Edge Computing:
Walk Through Access Control Systems
- Philippe Lin and Roel Reyes
-
Quark Engine - An Obfuscation-Neglect
Android Malware Scoring System
- JunWei Song,KunYu Chen,IokJin Sih,AnWei Kung and Chung Hsin Chen
-
PEsidious - Create Mutated Evasive
Malware Using Artificial Intelligence
- Chandni Vaya and Bedang Sen
-
Closing Note
- Dhillon 'L33tdawg' Kannabhiran