|=------------------------------------------------------------------------------------------------=|
######## ######## ######## ###### ####### ## ## ######## ####### ## ## ########
## ## ## ## ## ## ## ## ### ## ## ## ## ## ### ### ##
## ## ## ## ## ## ## #### ## ## ## ## ## #### #### ##
## ## ###### ###### ## ## ## ## ## ## ######## ## ## ## ### ## ######
## ## ## ## ## ## ## ## #### ## ## ## ## ## ## ##
## ## ## ## ## ## ## ## ## ### ## ## ## ## ## ## ##
######## ######## ## ###### ####### ## ## ## ## ####### ## ## ########
|=------------------------------------------------------------------------------------------------=|
DEF CON group 11396 @ Rome, Italy
[Main] [Meetings] [Posts] [Projects]
|=----------------------------------=[ List of talks in 2018 ]=-----------------------------------=|
by malweisse
The talks given during the meetings in 2018 are:
- Who we are and what is a DEF CON group, by malweisse
https://docs.google.com/presentation/d/1zFaUcCbtcm9Bb8POnuA-CbDq8xprVQvZzgI214174lM/edit?usp=sharing
- Tales of cheap duckies: combining Digispark Attiny85, TOR and the Empire Framework, by W1ckDavid
https://docs.google.com/presentation/d/1sggt4zMoPoEoYGHxbx7OWVuZWJnJ6NIIGYcHLYFuaFM/edit?usp=sharing
- RopGun: runtime detection of ROP payload executions, by anticlockwise
https://docs.google.com/presentation/d/1uoO23Qgu17Qme2EFHDmlScZqEOGvZdd7-FBsTbd65-4/edit?usp=sharing
- Angr & Pwn: vulnerability detection using symbolic execution, by malweisse
https://docs.google.com/presentation/d/1_64Vm0pw6QpFbBYy8s1RHkDrJHj4zHIc7d8yTrSr1JI/edit?usp=sharing
- Weaknesses of blockchain applications, by simonebronzini
https://drive.google.com/file/d/1ZrsK4YBE60CggeOvF9pWn8uCglPlVI8S/view
- Flare-On5 #12, a trip into bootkits and esoteric ISAs, by dp1
https://docs.google.com/presentation/d/1Ycd0r-7ftUTRAWanOAYun6nkEaZIU1SUI1dIBxZ-EVg/edit?usp=sharing
- Side channels attacks in air-gapped environments, by gdl_jotaro_sama
https://drive.google.com/file/d/1cNfqtHt7ppZ57mmjvdFCpV2dGwOpXBqm/view?usp=sharing
- Dynamic Binary Instrumentation for Malware analysis, by f_palmaro
https://drive.google.com/file/d/1dYr8s2DKEdYb_G-wlEykLIyHFosWai2n/view?usp=sharing