|=------------------------------------------------------------------------------------------------=|

 ########  ######## ########  ######   #######  ##    ##    ########   #######  ##     ## ######## 
 ##     ## ##       ##       ##    ## ##     ## ###   ##    ##     ## ##     ## ###   ### ##       
 ##     ## ##       ##       ##       ##     ## ####  ##    ##     ## ##     ## #### #### ##       
 ##     ## ######   ######   ##       ##     ## ## ## ##    ########  ##     ## ## ### ## ######   
 ##     ## ##       ##       ##       ##     ## ##  ####    ##   ##   ##     ## ##     ## ##       
 ##     ## ##       ##       ##    ## ##     ## ##   ###    ##    ##  ##     ## ##     ## ##       
 ########  ######## ##        ######   #######  ##    ##    ##     ##  #######  ##     ## ######## 
 
|=------------------------------------------------------------------------------------------------=|

                                 DEF CON group 11396 @ Rome, Italy
                                
                               [Main] [Meetings] [Posts] [Projects] 


|=----------------------------------=[ List of talks in 2019 ]=-----------------------------------=|

by malweisse
The talks given during the meeting in 2019 are: - Transient Execution Attacks explained to your Grandma, by anticlockwise https://docs.google.com/presentation/d/1DylZk40ixblYL1y1xq4rmz1qu_wn1TpRAeiBo3D9DbQ/edit?usp=sharing - Foreshadow-VMM: Breaking Virtual Machines Isolation, by marcux_95 https://drive.google.com/file/d/1CEPr9Av2DafAe5NH4c6cBV6fGe8pcB9B/view?usp=sharing - Ghidra: reviewing the new player in the RE scene, by Blazef104 https://docs.google.com/presentation/d/1O8EqzydwZvqYaTz8ie9arK2WBEcHeDAPk44upleZDNg/edit?usp=sharing - A little green bug has come to get squashed! Fuzzing like the Legendary Super Saiyan, by malweisse https://docs.google.com/presentation/d/1CgsqmWMJhGdCHQfZVhA5hRD-240rcz_7nU5DZhXDL00/edit?usp=sharing - A journey through time and binary exploitation, by cristianrichi3 https://docs.google.com/presentation/d/1S2TLvPSG0GwfZuhXKzp1D1ji6jukKYpRyxFRC9qAsUE/edit?usp=sharing - SAFE: Self Attentive Function Embedding for binary similarity, by lmass91 https://drive.google.com/file/d/12Fzm31kgY6OMobsDg7Ow6ZGyZh24RzPy/view?usp=sharing - Transient Execution Attacks: Episode II - Attack of the Zombies, by anticlockwise https://docs.google.com/presentation/d/163OMGXClLn3IVbHrBUki-y1UwWjgrQZiHVUF8AwIM_I/edit?usp=sharing - Red Teaming: I love it when a plan comes together, by namegar - The layman guide to ChakraCore Exploitation, by chqmatteo https://drive.google.com/file/d/1_0uqHAa0aRPAXVe6zmuoFDUoAsoyVNCu/view?usp=sharing - Smashing the SOP for fun and profit, by bonaff and TheNodi https://docs.google.com/presentation/d/1KY2ihbJf4MyL6jbvHBwLX-MyIit4mCpxBJ0mFmn44fc/edit?usp=sharing - How to reverse a firmware without pain, by cristianrichi3 and chqmatteo https://drive.google.com/file/d/1gKaNRP_MYoV3fiRycwHZpDI61-g5MX7D/view?usp=sharing - SIM cards: the new frontier of mobile exploitation, back from the past, by gdl_jotaro_sama https://drive.google.com/file/d/17BztuVJgN3l3O5VRwp38gXQoBlTn7BKa/view?usp=sharing