Goa 2017

FROM THE ARCHIVES

Download Collection

Keynote - Joshua Pennell

Antivirus Evasion Reconstructed - Veil 3.0 by Christopher Truncer

Case Study on RFID (proximity cards) Hacking by Sarwar Jahan and Ashwath Kumar

Explorer's Guide to Shooting Satellite Transponders by Jay Turla

Injecting Security into Web apps with Runtime Patching and Context Learning by Ajin Abraham

Invoke - Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To) D""e` Tec` T 'Th'+'em' by Daniel Bohannon

The Mirai BotNet and where DDoS attacks are headed by Ben Herzberg

Tale of training a Web Terminator! By Bharadwaj Machiraju

The Art of Bootloader Unlocking: Exploiting Samsung Sboot by Nitay Artenstein

Hacking medical devices and infrastructure by Anirudh Duggal

Hypervisors in Your Toolbox: Monitoring and Controlling System Events with HyperPlatform by Satoshi Tanda and Timo Kreuzer

p≡p ≡ pretty Easy privacy: making privacy the default for everyone by Sva

Case study of SS7 / Sigtran assessment by Akib Sayyed

Drone Hijacking and other IoT hacking with GNU Radio and SDR by Arthur Garipov

Nearly generic fuzzing of XML - based formats by Nicolas Gregoire

Blockchain and security: bank and insurance applications by Renaud Lifchitz

7 sins of ATM protection against logical attacks by Timur Yunusov

Rapid Security in the Cloud with AWS and CIS by Mikhail Advani & Rajesh Tamhane

Rapid Security in the Cloud with AWS and CIS by Mikhail Advani & Rajesh Tamhane