Index of /Conferences/DEF_CON_31_(2023)/Talks/Track_3

      Name                                                                                                                 Last modified      Size  Description
Parent Directory - An_Audacious_Plan_to_Halt_the_Internet's_Enshittification/ 2024-10-04 21:39 - Apple's_Predicament_NSPredicate_Exploitation_on_macOS_and_iOS/ 2024-10-04 21:40 - Backdoor_in_the_Core_-_Altering_the_Intel_x86_Instruction_Set_at_Runtime/ 2024-10-04 21:41 - certmitm_automatic_exploitation_of_TLS_certificate_validation_vulnerabilities/ 2024-10-04 21:45 - Contactless_Overflow_Code_execution_in_payment_terminals_and_ATM's_over_NFC/ 2024-10-04 21:48 - ELECTRONizing_macOS_privacy_-_a_new_weapon_in_your_red_teaming_armory/ 2024-10-04 21:49 - Fantastic_Ethertypes_and_Where_to_Find_Them/ 2024-10-04 21:51 - Getting_a_Migraine_-_uncovering_a_unique_SIP_bypass_on_macOS/ 2024-10-04 21:51 - GhostToken_Exploiting_Google_Cloud_Platform_App_Infrastructure_to_Create_Unremovable_Trojan_Apps/ 2024-10-04 21:53 - J4_Gate_The_Hustler_Poker_Cheating_Scandal_investigation_and_how_Hacking_helped_me_do_it/ 2024-10-04 21:54 - Reproductive_Justice_in_the_Age_of_Digital_Surveillance/ 2024-10-04 22:01 - Snoop_on_to_them_as_they_snoop_on_to_us/ 2024-10-04 22:07 - Tetra_Tour_de_Force/ 2024-10-04 22:08 - The_GitHub_Actions_Worm_Compromising_GitHub_repositories_through_the_Actions_dependency_tree/ 2024-10-04 22:13 - The_Hackers_The_Lawyers_And_The_Defense_Fund/ 2024-10-04 22:15 - The_Nightmare_of_Apple's_OTA_Update_Bypassing_the_Signature_Verification_and_Pwning_the_Kernel/ 2024-10-04 22:19 - The_RingHopper_Journey_or_How_We_Almost_Zero_day'd_the_World/ 2024-10-04 22:24 - Turning_my_virtual_wallet_into_a_skimming_device_mPOS_solutions/ 2024-10-04 22:30 - Unlocking_Doors_from_Half_a_Continent_Away/ 2024-10-04 22:34 - Unlocking_hidden_powers_in_Xtensa_based_Qualcomm_Wifi_chips/ 2024-10-04 22:36 - ndays_are_also_0days_Can_hackers_launch_0day_RCE_attack_on_popular_softwares_only_with_chromium_ndays/ 2024-10-06 22:06 - Retro_Exploitation_Using_Vintage_Computing_Plaforms_as_a_Vulnerability_Research_Playground_and_Learning_Environment/ 2024-10-06 22:07 - The_Price_of_Convenience_How_Security_Vulnerabilities_in_Global_Transportation_Payment_Systems_Can_Cost_You/ 2024-10-06 22:08 - Track_the_Planet_Mapping_Identities_Monitoring_Presence_and_Decoding_Business_Alliances_in_the_Azure_Ecosystem/ 2024-10-06 22:08 -