TRANSLATE

English French German Spain Italian Dutch
Russian Portuguese Japanese Korean Arabic Chinese Simplified
Showing posts with label Black Hat USA 2015. Show all posts
Showing posts with label Black Hat USA 2015. Show all posts

Monday, July 25, 2016

BREAKING HTTPS WITH BGP HIJACKING

BREAKING HTTPS WITH BGP HIJACKING
By
Artyom Gavrichenkov
Qrator Labs (ag@qrator.net)








Understanding and Managing Entropy Usage









INTERNET PLUMBING FOR SECURITY PROFESSIONALS: THE STATE OF BGP SECURITY

INTERNET PLUMBING FOR SECURITY PROFESSIONALS: THE STATE OF BGP SECURITY
By
Wim Remes – Rapid7








Exploiting the DRAM rowhammer bug to gain kernel privileges

Exploiting the DRAM rowhammer bug to gain kernel privileges
Mark Seaborn, sandbox builder and breaker
with contributions by Thomas Dullien, reverse engineer








Exploiting Trustzone on Android

Exploiting Trustzone on Android
By
Di Shen(@returnsme) retme7@gmail.com








Attacking ECMAScript Engines with Redefinition

Attacking ECMAScript Engines with Redefinition
By
Natalie Silvanovich, Google









XXE defence(les)s in JDK XML parsers

XXE defence(les)s in JDK XML parsers
By
Sergey Gorbaty sergey.gorbaty@salesforce.com
Xiaoran Wang xiaoran.wang@salesforce.com
Hormazd Billimoria hbillimoria@salesforce.com
Jonathan Brossard jbrossard@salesforce.com








The Applications of Deep Learning on Traffic Identification

The Applications of Deep Learning  on Traffic Identification
By
Zhanyi Wang (wangzhanyi@360.cn)







ROPInjector: Using Return- Oriented Programming for Polymorphism and AV Evasion

ROPInjector: Using Return-Oriented Programming for Polymorphism and AV Evasion
by G. Poulios, C. Ntantogian, C. Xenakis






BYPASS CONTROL FLOW GUARD COMPREHENSIVELY

BYPASS CONTROL FLOW GUARD COMPREHENSIVELY
by Zhang Yunhai