|=------------------------------------------------------------------------------------------------=| ######## ######## ######## ###### ####### ## ## ######## ####### ## ## ######## ## ## ## ## ## ## ## ## ### ## ## ## ## ## ### ### ## ## ## ## ## ## ## ## #### ## ## ## ## ## #### #### ## ## ## ###### ###### ## ## ## ## ## ## ######## ## ## ## ### ## ###### ## ## ## ## ## ## ## ## #### ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ### ## ## ## ## ## ## ## ######## ######## ## ###### ####### ## ## ## ## ####### ## ## ######## |=------------------------------------------------------------------------------------------------=| DEF CON group 11396 @ Rome, Italy [Main] [Meetings] [Posts] [Projects] |=----------------------------------=[ List of talks in 2019 ]=-----------------------------------=|by malweisse The talks given during the meetings in 2019 are: - Transient Execution Attacks explained to your Grandma, by anticlockwise https://docs.google.com/presentation/d/1DylZk40ixblYL1y1xq4rmz1qu_wn1TpRAeiBo3D9DbQ/edit?usp=sharing - Foreshadow-VMM: Breaking Virtual Machines Isolation, by marcux_95 https://drive.google.com/file/d/1CEPr9Av2DafAe5NH4c6cBV6fGe8pcB9B/view?usp=sharing - Ghidra: reviewing the new player in the RE scene, by Blazef104 https://docs.google.com/presentation/d/1O8EqzydwZvqYaTz8ie9arK2WBEcHeDAPk44upleZDNg/edit?usp=sharing - A little green bug has come to get squashed! Fuzzing like the Legendary Super Saiyan, by malweisse https://docs.google.com/presentation/d/1CgsqmWMJhGdCHQfZVhA5hRD-240rcz_7nU5DZhXDL00/edit?usp=sharing - A journey through time and binary exploitation, by cristianrichi3 https://docs.google.com/presentation/d/1S2TLvPSG0GwfZuhXKzp1D1ji6jukKYpRyxFRC9qAsUE/edit?usp=sharing - SAFE: Self Attentive Function Embedding for binary similarity, by lmass91 https://drive.google.com/file/d/12Fzm31kgY6OMobsDg7Ow6ZGyZh24RzPy/view?usp=sharing - Transient Execution Attacks: Episode II - Attack of the Zombies, by anticlockwise https://docs.google.com/presentation/d/163OMGXClLn3IVbHrBUki-y1UwWjgrQZiHVUF8AwIM_I/edit?usp=sharing - Red Teaming: I love it when a plan comes together, by namegar - The layman guide to ChakraCore Exploitation, by chqmatteo https://drive.google.com/file/d/1_0uqHAa0aRPAXVe6zmuoFDUoAsoyVNCu/view?usp=sharing - Smashing the SOP for fun and profit, by bonaff and TheNodi https://docs.google.com/presentation/d/1KY2ihbJf4MyL6jbvHBwLX-MyIit4mCpxBJ0mFmn44fc/edit?usp=sharing - How to reverse a firmware without pain, by cristianrichi3 and chqmatteo https://drive.google.com/file/d/1gKaNRP_MYoV3fiRycwHZpDI61-g5MX7D/view?usp=sharing - SIM cards: the new frontier of mobile exploitation, back from the past, by gdl_jotaro_sama https://drive.google.com/file/d/17BztuVJgN3l3O5VRwp38gXQoBlTn7BKa/view?usp=sharing