Jump to content
Nytro

POC 2014 slides

Recommended Posts

Posted

Archieves of POC201

POC2014


[TABLE=class: table table-bordered, width: 1045]

[TR]

[TD] Bo Qu, Royce Lu, @ga1ois, "Advanced Defense for Internet Explorer"[/TD]

[TD][/TD]

[TD=width: 16][/TD]

[TD=width: 16][/TD]

[/TR]

[TR]

[TD] Byoungyoung Lee, "Identifying Memory Corruption Bugs with Compiler Instrumentations"[/TD]

[TD=width: 21][/TD]

[TD=width: 16][/TD]

[TD=width: 16][/TD]

[/TR]

[TR]

[TD] Florian Grunow, "How to Own your Heart - Hacking Medical Devices"[/TD]

[TD=width: 21][/TD]

[TD=width: 16][/TD]

[TD=width: 16][/TD]

[/TR]

[TR]

[TD] GilGil, "mVoIP Hacking"[/TD]

[TD=width: 21][/TD]

[TD=width: 16][/TD]

[TD=width: 16][/TD]

[/TR]

[TR]

[TD] hotwing, "Hunting Zero Days in Crash Dumps"[/TD]

[TD=width: 21][/TD]

[TD=width: 16][/TD]

[TD=width: 16][/TD]

[/TR]

[TR]

[TD] John C. Matherly, "Behind the Scenes of Shodan"[/TD]

[TD=width: 21][/TD]

[TD=width: 16][/TD]

[TD=width: 16][/TD]

[/TR]

[TR]

[TD] Karsten Nohl, "BadUSB — On accessories that turn evil"[/TD]

[TD=width: 21][/TD]

[TD=width: 16][/TD]

[TD=width: 16][/TD]

[/TR]

[TR]

[TD] K-dupe, Hyunuk, Kibom, "Physical Memory File Extraction Based on File Object Analysis"[/TD]

[TD=width: 21][/TD]

[TD=width: 16][/TD]

[TD=width: 16][/TD]

[/TR]

[TR]

[TD] Matt, AbdulAziz, Jasiel , "Dropping the MIC (Medium Integrity Calculator): Pwning Internet Explorer for fun "[/TD]

[TD=width: 21][/TD]

[TD=width: 16][/TD]

[TD=width: 16][/TD]

[/TR]

[TR]

[TD] Maxim Goncharov, "Be first to know about data breach of popular web sites"[/TD]

[TD=width: 21][/TD]

[TD=width: 16][/TD]

[TD=width: 16][/TD]

[/TR]

[TR]

[TD] MJ0011, "Windows 10 Control Flow Guard Internals"[/TD]

[TD=width: 21][/TD]

[TD=width: 16][/TD]

[TD=width: 16][/TD]

[/TR]

[TR]

[TD] passket & Team SNE, "Only True Love Can Thaw Frozen SCADA Systems"[/TD]

[TD=width: 21][/TD]

[TD=width: 16][/TD]

[TD=width: 16][/TD]

[/TR]

[TR]

[TD] Tombkeeper, "JavaScript VM breakout based exploiting"[/TD]

[TD=width: 21][/TD]

[TD=width: 16][/TD]

[TD=width: 16][/TD]

[/TR]

[TR]

[TD] Wei Yan, "Auto Mobile Malware, Attack Scenarios, and How to Defend"[/TD]

[TD=width: 21][/TD]

[TD=width: 16][/TD]

[TD=width: 16][/TD]

[/TR]

[/TABLE]

POC will show you only technical, creative and very interesting topics. Fuck off, marketing and commercial presentation!

Sursa: POC2015 - We Trust a Power Of Community

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...