Welcome to OPCDE 2019
Этот коммит содержится в:
родитель
61e6f5307a
Коммит
6289d00bdc
@ -1,8 +1,17 @@
|
|||||||
# OPCDE
|
# OPCDE
|
||||||
OPCDE Kenya 2018
|
OPCDE Kenya 2019
|
||||||
|
|
||||||
|
Create a folder using the following format "<Talk name> - <Authors>" containing your slides and materials.
|
||||||
|
|
||||||
## Agenda
|
## Agenda
|
||||||
- Program Analysis on Smart Contracts - JP Smith, Trail Of Bits
|
- Automated Reverse Engineering of Industrial Control Systems Binaries (Mihalis Maniatakos)
|
||||||
- A Walk With Shannon: A walkthrough of a PWN2OWN Baseband exploit - Amat Cama, Independant
|
- Using Symbolic Execution to Root Routers (Mathy Vanhoef)
|
||||||
- Reversing the Octagon: Next-Gen Windows Security - Alex Ionescu, Dave Weston
|
- Evolving Attacker Techniques in Account Takeover (Philip Martin)
|
||||||
- The Baseband Basics: Understanding, Debugging and Pwning the Mediatek Communication Processor - Nitay Artenstein, Charles Muiruri
|
- Lions at the watering hole (Andrei Boz)
|
||||||
|
- Next Gen IoT Botnets - owning 450.000 devices from a single vendor (Alex "Jay" Balan)
|
||||||
|
- Danger of using fully homomorphic encryption,a look at Microsoft SEAL (Zhiniang Peng)
|
||||||
|
- (SAP) Gateway to Heaven (Mathieu GELI)
|
||||||
|
- NTLM Relay Is Dead,NO, this is impossible (sanr, Yang Zhang)
|
||||||
|
- Modern Secure Boot Attacks: Bypassing Hardware Root of Trust from Software (Alex Matrosov)
|
||||||
|
- Practical Uses for Memory Visualization (Ulf Frisk)
|
||||||
|
- Trade War: Shellcode's Wielding of Imports and Exports (Willi Ballenthin)
|
||||||
Загрузка…
x
Ссылка в новой задаче
Block a user