Login Papers Register

Need an account to vote? Register to attend at gsec.hitb.org/sg2018/
Deadline is 30th June 2018!


Don't have an account? Register!
Title Author(s) Votes
NFC Payments: The Art of Relay & Replay Attacks Salvador Mendoza 8
Is The Pen Mightier Than The Sword? A First Look Into The Security of The Apple Pencil and the Apple SmartKeyboard Stefan Esser 8
The Road to iOS Sandbox Escape Rani Idan 8
Traversing the Kill-Chain: The New Shiny in 2018 Vincent Yiu 8
Viewer Discretion Advised: (De)coding an iOS Vulnerability Adam Donenfeld 8
GOD MODE UNLOCKED: Hardware Backdoors in x86 CPUs Christopher Domas 8
Ghost in the Locks: Owning Electronic Locks Without Leaving a Trace Tomi Tuominen and Timo Hirvonen 8
Exploiting Automation in LTE Mobile Networks Altaf Shaik & Ravishankar Borgaonkar 8
Bicycle Day: Hacking BLE Bicycle Locks for Fun and (a Small) Profit Vincent Tan 8
FILE Structures: Another Binary Exploitation Technique An-Jie Yang (Angeboy) 8
Exploiting Vulnerabilities in Open Source Libraries: A Primer Bruno Bossola 7
From Assembly to JavaScript and Back: Turning Memory Errors into Code Execution with Client-Side Compilers Robert Gawlik 6
Telecom Battlefield: How SS7 Trojans Bypass All Existing Security Features Sergey Puzankov 5
A Year of Purple: Stories, Challenges and Lessons from the Frontlines Ryan Shepherd 5
Deep Hooks: Monitoring Native Execution in WoW64 Applications Yarden Shafir & Assaf Carlsbad 5
Hunting PBX for Vulnerabilities Sachin Wagh & Himanshu Mehta 4
Let Me Entertain You: Car Infotainment Hacking and Attack Surface Scenarios Jay Turla 4
Post Exploit Goodness on a Mainframe: Special is the New Root Ayoub Elaassal 4
DARWIN (a real world use case of covert wireless) Rushikesh D. Nandedkar & Arun Mane 4
Unusual Windows Insider Preview Exploitation James Lee 4
unKRACK: Mitigating Future WPA2 Vulnerabilities Mathy Vanhoef 4
Breaking Ed: Hacking Oracle JD-Edwards Systems Vladimir Egorov & Mikhail Medvedev 4
Kingpin: Bypassing TCP Certificate-Pinning like a Boss Tal Melamed 3
Kernel Sanders: Bypassing Android Security Mechanisms Using a Custom Kernel SungHyoun Song 3
Keeping Containers Afloat Nir Valtman & Jason Patterson 2
Side Channel Attacks on a Quantum Key Distribution System Martina Bodini 2
TwitIntel: Social Media Data Analytics for Black/Grey and White-Hats Fyodor Yarochkin, Vladimir Kropotov & Lion Gu 2
Secure Trade: Exposing Security Flaws in Trading Technologies Alejandro Hernandez 2
Index This: What We Can Learn from Log Search Nikolay Akatyev & Cyril Quitevis 2
Swimming IoT: A Hackers Journey into the (in)Security of Modern Yachts Stephan Gerling 1
Detecting APT Attacks Against Active Directory Using Machine Learning Wataru Matsuda & Mariko Fujimoto 1
The Role of Remote Access Trojans in the Malware Ecosystem: How njRAT Forged its Way Into History Veronica Valeros 1
Building Blocks of a Corporate Sized Fraud Prevention System Yury Leonychev 1
Using SmartNICs to Provide Better Data Center Security Ofir Arkin 1
DNS Exfiltration and Out-of-Band Attacks Nitesh Shilpkar 1
SAP Incident Response: Real Life Examples on How to Attack and Defend Jordan Santarsieri 1
Flatliners: The Dire Consequence of Poor Hospital Security Xavier Mertens, John Opdenakker & Jelena Milosevic 1
Offensive and Offended Machine Learning Omar "Beched" Ganiev 1
Generative Adversarial Malware: Arming Malware with GANs Maria Rigaki 0
Black Box Threat Modeling Avi Douglen 0
A Methodology for Assessing JavaScript Software Protections Pedro Fortuna 0
Beware of the Bashware: A New Method for Any Malware to Bypass Security Solutions Gal Elbaz 0
FOCUS ON OTHER FEATURES: Hiding Tasks via Task Switching Kyeong Joo Jung 0
Busting the DLP Myth Using Data Mining and Machine Learning Dani Goland 0
Red Teaming to Combat ICS Cyber Security Threats Michael Rebultan 0
Good Shell Gone Bad: Identifying Malicious PowerShell Michael Jay Villanueva & John Kevin Sanchez 0
Exposed Devices and Supply Chain Attacks: Overlooked Risks in Healthcare Networks Mayra Fuentes 0
Defending Cloud Infrastructure with Cloud Security Suite Jayesh Singh Chauhan 0
The Cassandra Curse: Believe me, You Will Need Machine Learning. Stratosphere IPS for Malware Traffic Detection Sebastian Garcia 0