Login Papers Register

Need an account to vote? Register to attend at gsec.hitb.org/sg2017/

User:
Pass:


Don't have an account? Register!
Title Author(s) Votes
A New Era of SSRF - Exploiting URL Parsers in Trending Programming Languages! Orange Tsai 8
A Deep Dive into the Digital Weapons of the North Korean Cyber Army Ashley Shen 8
MythBusters: CVE-2017-5689 - How We Broke Intel AMT Dmitriy Evdokimov 7
QEMU Attack Surface and Security Internals Qiang Li 7
NeuralFuzz: Neural Networks for Fuzzing Web Apps Ivan Novikov 6
Spy vs. Spy: A Modern Study of Microphone Bugs Veronica Valeros 5
Hunting for Vulnerabilities in Hadoop Thomas DEBIZE 5
Radio Exploitation 101: Characterizing, Contextualizing, and Applying Wireless Attack Methods Matt Knight 5
Ro(o)tten Apples: Vulnerability Heaven in the iOS Sandbox Adam Donenfeld 5
Get to the Money: Hacking POS and POP Systems Dmitry Chastuhin 5
Are You Watching? Smart TV Hacking with 0-days Hanbyeol Ji 4
Catch Me If You Can: Building Your Own 3G IMSI Catcher Ravishankar Borgaonkar 4
Component Hijacking on Android: From Birth to Death Daoyuan Wu 4
Beyond Crashes: Exploiting Runtime Diversity to Uncover Semantic Bugs with NEZHA Adrian Tang 4
XFLTReaT: A New Dimension in Tunnelling Balazs Bucsay 4
Securing a Private Blockchain Implementation Najwa Aaraj 4
Sophisticated SS7 Attacks - How to Intercept an SMS Message While Staying Stealthy Sergey Puzankov 3
Exploiting IoT Devices over Software Defined Radio, ZigBee, WiFi and BLE Swaroop Yermalkar 3
Hacking Robots Before Skynet Lucas Apa 3
A Year In The Red Dominic Chell 3
When Your Firewall Goes Nuts Birk Kauer 2
Era-Glonass is a Dome Above Us Arthur Garipov 2
BITSInject: Taking Control Over BITS Dor Azouri 2
Network Automation is Not Your Safe Haven: Protocol Analysis and Vulnerabilities of Autonomic Networks Omar Eissa 2
Cumulus - A Cloud Exploitation Toolkit Javier Godinez 2
What Could Go Wrong with Stateful Quantum Resistant Digital Signatures Najwa Aaraj 1
Terrorist, Hacker, Consultant Spy: Applying Intelligence and Counterintelligence Techniques to Cyber Network Operations (CNO) Joseph Hesse 1
Diameter Security: An Auditor's Viewpoint Sergey Mashukov 1
Androsia: A Tool for Securing 'In Memory' Data Samit Anwer 1
Browser Exploits? Grab Them by The… Collar! Debasish Mandal 1
Threat Hunting: Be The Hunter, Not The Prey Hamza Beghal 1
How to Hide Your Browser 0-days Zoltan Balazs 1
Breaching Malware C2s for Fun and Prosecutions John Bambenek 1
Echo Hacking: Demystifying Intelligent Personal Assistant Ashritha H 1
Mobile Apps vs Malware Łukasz Bobrek 0
Mobile App Attack Sneha Rajguru 0
The Lightway Approach to Building a Cloud Security Training Platform Hsu Chinghsiung 0
3rd Party Data Burns Arron Finnon 0
SSRF - Port Scanning with Skenpot Muhammad Fikri Ahmad Fadzil 0
Packet Brokers for Network Threats Analysis. Pros and Cons Andrey Dugin 0
Looting Your Bank With the Help of the Government Indrajeet Bhuyan 0
iGoat – A Self Learning Tool for iOS App Pentesting and Security Swaroop Yermalkar 0
Hunting Hunters with OSInt Michael Rebultan 0
Message in a Bottle: Attacking Distributed Nodes Chen Siyu 0
Good Hackers Go to Heaven, Great Hackers Go Everywhere Christina Kubecka 0
Contemporary Malwares: Techniques and Kernel Tricks Alexandre Borges 0
Google Dorks: Analysis, Creation, and New Defenses Flavio Toffalini 0
Offensive IT Operations: Who Stole the Crown Jewels Tanoy Bose 0
A Study of Exposed Unauthenticated Systems on the Internet Ryan Flores 0