36 строки
2.4 KiB
Markdown
36 строки
2.4 KiB
Markdown
# OPCDE
|
||
OPCDE Materials (2017-2019)
|
||
|
||
## 2019
|
||
* Automated Reverse Engineering of Industrial Control Systems Binaries - Mihalis Maniatakos (@realmomalab)
|
||
* Using Symbolic Execution to Root Routers - Mathy Vanhoef (@vanhoefm)
|
||
* Evolving Attacker Techniques in Account Takeover - Philip Martin (@securityguyphil)
|
||
* Lions at the watering hole - Andrei Boz (@dekeneas)
|
||
* Next Gen IoT Botnets - owning 450.000 devices from a single vendor - Alex "Jay" Balan (@jaymzu)
|
||
* Danger of using fully homomorphic encryption,a look at Microsoft SEAL - Zhiniang Peng (@edwardzpeng)
|
||
* (SAP) Gateway to Heaven - Mathieu Geli & Dmitry Chastuhin (@gelim, @_chipik)
|
||
* NTLM Relay Is Dead,NO, this is impossible - sanr, Yang Zhang (@by_sanr, @izykw)
|
||
* Modern Secure Boot Attacks: Bypassing Hardware Root of Trust from Software - Alex Matrosov (@matrosov)
|
||
* Practical Uses for Memory Visualization - Ulf Frisk (@UlfFrisk)
|
||
* Trade War: Shellcode's Wielding of Imports and Exports - Willi Ballenthin (@williballenthin)
|
||
* WhatsApp Digger - Deemah A Alotaibi, Lamyaa S Alsaleem, Malak F Aldakheel, Sarah A Alqhtani (@_Saraque @Lamya_Alsleem @DeemaAlotaibi5 @Malakfsd)
|
||
|
||
## 2017
|
||
* Keynote 1 - Revisiting the state - Maarten Van Horenbeeck (@maartenvhb)
|
||
* Keynote 2 - Wim Remes (@wimremes)
|
||
* The Blackbox of DPAPI: the gift that keeps on giving - Bartosz Inglot (@BartInglot)
|
||
* Transforming Open Source to Open Access in Closed Applications: Finding Vulnerabilities in Adobe Reader's XSLT Engine - Abdul-Aziz Hariri (@abdhariri), Jasiel Spelman (@WanderingGlitch), Brian Gorence
|
||
* From mimikatz to kekeo, passing by new Microsoft security technologies - Benjamin Delpy (@gentilkiwi)
|
||
* Agentless Post Exploitation on Device Guarded Systems - Christopher Truncer (@ChrisTruncer)
|
||
* Security Research and Development with LLVM - Andrew Reiter (@andrew_opcde)
|
||
* Supply Chainsaw: Practical software supply chain attacks - Matt Weeks (@scriptjunkie1)
|
||
* Hacking wireless SCADA systems - Elena Feldman
|
||
* Exploring Your System Deeper - Oleksandr Bazhaniuk (@ABazhaniuk)
|
||
* Windows Operating System Archaeology - Matt Nelson (@enigma0x3)
|
||
* Blinded Random Block Corruption - Rodrigo Branco (@bsdaemon)
|
||
* Practical attacks against Digital Wallet - Loic Falletta (@zavidan)
|
||
* 15 ways to break RSA security - Renaud Lifchitz (@nono2357)
|
||
* Stranger Danger - Mohamed Saher (@halsten), Ahmed Garhy (@9ee1), Nikita Tarakanov (@NTarakanov)
|
||
* Lighting Talk
|
||
* Our Financial System is under Attack - Matt Suiche (@msuiche) & @x0rz
|