|=------------------------------------------------------------------------------------------------=|

 ########  ######## ########  ######   #######  ##    ##    ########   #######  ##     ## ######## 
 ##     ## ##       ##       ##    ## ##     ## ###   ##    ##     ## ##     ## ###   ### ##       
 ##     ## ##       ##       ##       ##     ## ####  ##    ##     ## ##     ## #### #### ##       
 ##     ## ######   ######   ##       ##     ## ## ## ##    ########  ##     ## ## ### ## ######   
 ##     ## ##       ##       ##       ##     ## ##  ####    ##   ##   ##     ## ##     ## ##       
 ##     ## ##       ##       ##    ## ##     ## ##   ###    ##    ##  ##     ## ##     ## ##       
 ########  ######## ##        ######   #######  ##    ##    ##     ##  #######  ##     ## ######## 
 
|=------------------------------------------------------------------------------------------------=|

                                 DEF CON group 11396 @ Rome, Italy
                                
                               [Main] [Meetings] [Posts] [Projects] 


|=--------------------------------------=[ December 2018 ]=---------------------------------------=|

by malweisse
This is the 4th meeting of the DEF CON group. Date and location: December 7th from 5 p.m. to 7 p.m. in the B2 room at the Department of Computer, Control, and Management Engineering (DIAG) Antonio Ruberti at Sapienza University of Rome. The schedule is: ---[ Side channels attacks in air-gapped environments, by gdl_jotaro_sama In this talk we give an overview of the techniques that are used in order to exfiltrate information from systems without an internet connection. We then see more in detail the case in which the target doesn't even have speakers, and in the end we quickly see even more advanced techniques for the most curious ones. Slides link: https://drive.google.com/file/d/1cNfqtHt7ppZ57mmjvdFCpV2dGwOpXBqm/view?usp=sharing ---[ Dynamic Binary Instrumentation for Malware analysis, by f_palmaro In this talk we will discuss the DBI technique, introducing its features and entering specifically in a framework implemented by Intel called PIN. We will then show an application of the framework to malware analysis and in particular to the fight against evasive malware. Slides link: https://drive.google.com/file/d/1dYr8s2DKEdYb_G-wlEykLIyHFosWai2n/view?usp=sharing Example PinTool: /assets/MyPinTool.tar.gz.