• Wednesday, August 3
  • Capturing 0day Exploits with PERFectly Placed Hardware Traps

    Kenneth Fitch, Cody Pierce, Matt Spisak
    Wed, 10:20 - 11:10
    Jasmine Ballroom
  • A Journey from JNDI/LDAP Manipulation to Remote Code Execution Dream Land

    Oleksandr Mirosh, Alvaro Munoz
    Wed, 11:30 - 12:20
    Jasmine Ballroom
  • Adaptive Kernel Live Patching: An Open Collaborative Effort to Ameliorate Android N-Day Root Exploits

    Tao Wei, Yulong Zhang
    Wed, 13:50 - 14:40
    Jasmine Ballroom
  • Intra-Process Memory Protection for Applications on ARM and x86: Leveraging the ELF ABI

    Julian Bangert, Sergey Bratus, Maxwell Koo
    Wed, 15:00 - 15:50
    Jasmine Ballroom
  • Captain Hook: Pirating AVs to Bypass Exploit Mitigations

    Tomer Bitton, Udi Yavo
    Wed, 16:20 - 17:10
    Jasmine Ballroom
  • Brute-Forcing Lockdown Harddrive PIN Codes

    Colin O'Flynn
    Wed, 17:30 - 18:00
    Jasmine Ballroom
  • Thursday, August 4
  • PINdemonium: A DBI-Based Generic Unpacker for Windows Executable

    LorenzoFontana, Sebastiano Mariani
    Thu, 09:00 - 09:25
    Jasmine Ballroom
  • Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages

    Anirudh Duggal
    Thu, 09:45 - 10:35
    Jasmine Ballroom
  • O-checker: Detection of Malicious Documents Through Deviation from File Format Specifications

    Yuhei Otsubo
    Thu, 11:00 - 11:25
    Jasmine Ballroom
  • Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf

    Xiaolong Bai, Luyi Xing
    Thu, 12:10 - 13:00
    Jasmine Ballroom
  • OSS Security Maturity: Time to Put On Your Big Boy Pants!

    Christine Gadsby, Jake Kouns
    Thu, 14:30 - 15:20
    Jasmine Ballroom
  • The Art of Reverse Engineering Flash Exploits

    Jeongwook Oh
    Thu, 15:50 - 16:40
    Jasmine Ballroom
  • Over the Edge: Silently Owning Windows 10's Secure Browser

    Herbert Bos, Erik Bosman, Cristiano Giuffrida, Kaveh Razavi
    Thu, 17:00 - 17:50
    Jasmine Ballroom