-
The Modern CISO:
Hacking Management While Defending The Fort
- Pepijn Kok
-
Dragon Slaying Guide:
Bug Hunting In VMware Device Virtualization
- JiaQing Huang,Yue Liu,Hao Zheng and Zibo Li
-
Who’s The Author? How Automated
Malware Attribution Engines Work
- Anton Belousov
-
Flash Loans:
The Blessing Or Curse Of DeFi
- Kritsada Dechawattana
-
Silencing Spies: Revealing Microphone Nonlinear
Behavior And Building An Ultrasonic Jammer
- Hetian Shi & Qing Wang
-
CoralRaider Targets Victims
Data And Social Media Accounts
- Joey Chen & Chetan Raghuprasad
-
Leaking Kakao: How A Combination Of Bugs
In KakaoTalk Compromises User Privacy
- Dawin Schmidt
-
Secret Scanning In Open Source At Scale (In-Depth)
- Danish Tariq & Hassan Khan Yusufzai
-
Design And Development Of A
Multi-Tenant SIEM Using Security Onion
- Wararit Hongkamnerd,Withawat Tangtrongpairoj,Pirawat Watanapongse and Surasak Sanguanpong
-
Hunting Trojans With AST
Transformers And Machine Learning
- Stanislav Rakovsky
-
My First And Last Shellcode Loader
- Dobin Rutishauser
-
Leveraging Request Smuggling For
Authentication Bypass And Remote Code Execution
- Adam Crosser
-
Breaking Fake Voice Detection
With Speaker-Irrelative Features
- Xuan Hai,Xin Liu,Yuan Tan and Song Li
-
Exploiting The In-Vehicle Browser:
A Novel Attack Vector In Autonomous Vehicles
- Ravi Rajput
-
Detecting Botnets Via DNS Traffic Analysis Using Machine Learning
- Withawat Tangtrongpairoj,Pirawat Watanapongse and Surasak Sanguanpong & Korrawit Chaikangwan
-
Words Have Meaning! Leveraging LLMs To Enhance
Insider Threat Investigation Capabilities
- Keggy The Keg
-
Discovering And Investigating Propagated Vulnerabilities
From Ethereum To Its Layer-2 Blockchains
- Daoyuan Wu & Ning Liu
-
TPMs And The Linux Kernel:
A Better Path To Hardware Security
- Ignat Korchagin
-
One SMS To Root Them All: Exposing Critical
Threats In Millions Of Connected Devices
- Sergey Anufrienko & Alexander Kozlov
-
Exploring Vulnerabilities In Flutter
Mobile Apps Through Reverse Engineering
- Sabina Llewellyn
-
BadUSB Attacks On MacOS:
Beyond Using The Terminal And Shell Commands
- Nicolas Buzy Debat
-
The Modern Hacker – From Insight To Impact
- Karsten Nohl
-
CTF Prize Giving / Lucky Draw
- HITB Crew