OPCDE/2019/Emirates/README.md
2019-04-21 06:58:00 +04:00

19 строки
1.2 KiB
Markdown
Исходник Ответственный История

Этот файл содержит неоднозначные символы Юникода

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# OPCDE
OPCDE U.A.E. 2019
Create a folder using the following format "Talk name - Authors" containing your slides and materials.
## Agenda
* Automated Reverse Engineering of Industrial Control Systems Binaries - Mihalis Maniatakos (@realmomalab)
* Using Symbolic Execution to Root Routers - Mathy Vanhoef (@vanhoefm)
* Evolving Attacker Techniques in Account Takeover - Philip Martin (@securityguyphil)
* Lions at the watering hole - Andrei Boz (@dekeneas)
* Next Gen IoT Botnets - owning 450.000 devices from a single vendor - Alex "Jay" Balan (@jaymzu)
* Danger of using fully homomorphic encryptiona look at Microsoft SEAL - Zhiniang Peng (@edwardzpeng)
* (SAP) Gateway to Heaven - Mathieu Geli & Dmitry Chastuhin (@gelim, @_chipik)
* NTLM Relay Is Dead,NO, this is impossible - sanr, Yang Zhang (@by_sanr, @izykw)
* Modern Secure Boot Attacks: Bypassing Hardware Root of Trust from Software - Alex Matrosov (@matrosov)
* Practical Uses for Memory Visualization - Ulf Frisk (@UlfFrisk)
* Trade War: Shellcode's Wielding of Imports and Exports - Willi Ballenthin (@williballenthin)
* WhatsApp Digger - Deemah A Alotaibi, Lamyaa S Alsaleem, Malak F Aldakheel, Sarah A Alqhtani (@_Saraque @Lamya_Alsleem @DeemaAlotaibi5 @Malakfsd)