-
Advanced Android Archaeology:
Baffled By Bloated Complexity
- Mathias Payer
-
Beyond LSASS: Cutting-Edge Techniques
For Undetectable Threat Emulation
- Priyank Nigam
-
Captain MassJacker Sparrow:
Uncovering The Malware's Buried Treasure
- Ari Novick
-
You Can't Touch This:
Secure Enclaves For Offensive Operations
- Matteo Malvica & Cedric Van Bockhaven
-
NO RECORDING! Ghost In The RaaS: Ransomware-as-a-Service
From The Perspective Of An Affiliate
- Carlos Ishimaru
-
What If I Told You That Security Is Here To Help?
(A.K.A. The 7 Habits Of Highly Effective Security Leaders)
- Sebastian Avarvarei
-
Demystifying Automated City Shuttles:
Blessing Or Cybersecurity Nightmare?
- Anastasija Collen
-
Code To Cloud: Exploiting Modern Web
Applications To Breach Cloud Environments
- Christophe Tafani-Dereeper
-
Next-Gen Hiring Meets AI, Cybersecurity, And Inclusion
- Nathalie Brodard,Line Pillet and Lennig Pedron & Nagib Aouini
-
Pioneering Zero Days At Pwn2Own Automotive 2024
- Alex Plaskett & McCaulay Hudson
-
Double Agent: Exploiting Pass-through
Authentication Credential Validation In Azure AD
- Ilan Kalendarov & Elad Beber
-
Cyber Innovation
- Laurent Balmelli & Hugo Flayac & Aziz Belkhiria & Olivier Crochat & Lennig Pedron
-
Access Granted: Uncovering RFID Readers
Vulnerabilities & Bypassing Physical Access Controls
- Julia Zduńczyk
-
EL3XIR: Fuzzing COTS Secure Monitors
- Marcel Busch & Christian Lindenmeier
-
Stop Making Nonsense:
Cutting Through Compliance Complexity
- Mat Caplan
-
Unlocking The Cybersecurity
Secrets Of Modern Vehicles
- Yuqiao Ning
-
Hack, Patch, Repeat:
Insider Tales From Android’s Bug Bounty
- Maria Uretsky & Olivier Tuchon
-
Introduction
- Raphaël Conz
-
The AI Paradox: Safety Vs Performance
- Rachid Guerraoui
-
The Rise Of AI-Driven Malware:
Threats, Myths, And Defenses
- Candid Wuest
-
The Spy Who Flashed Me: Exploring And
Defeating Physical Access Control Systems
- Michael Rodger
-
20 Years Of Cybersecurity Automation:
Has AI Restored Balance To The Force?
- Raphaël Marichez
-
Good Models Gone Bad:
Visualizing Data Poisoning
- Maria Khodak
-
Cache Me If You Can:
Smuggling Payloads Via Browser Caching Systems
- Aurélien Chalot
-
"A Slice Of" Modern Program Analysis
- Kyle Martin
-
The Art Of Malware Smuggling:
Unmasking SVG-Based Attack Techniques
- Dhiraj Mishra
-
Don't Let Jia Tan Have All The Fun:
Hacking Into Fedora And OpenSUSE
- Thomas Chauchefoin & Maxime Rinaudo
-
Malware Analysis With R2AI
- Axelle Apvrille
-
Your Identity Is Mine: Techniques And
Insights From OS Identity Providers Research
- Maor Abutbul
-
Data Sets That Can Make A Difference:
Improving Your Hunting And Detection In Entra ID And O365
- John Stoner
-
Go Parser Footguns
- Vasco Franco
-
Beyond The Surface: Exploring Attacker
Persistence Strategies In Kubernetes
- Rory McCune