Content List
1. From Zero to Sixty - The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower
2. Finding Bugs Compiler Knows but Doesn't Tell You-Dissecting Undefined Behavior Optimizations in LLVM
3. Cross-Site Escape - Pwning macOS Safari Sandbox the Unusual Way
4. Permission Mining in GCP
5. Debug Resurrection on Nordic nRF52 Series
6. Please Make a Dentist Appointment ASAP - Attacking IOBluetoothFamily HCI and Vendor-Specific Commands
7. Bypassing NGAV for Fun and Profit
8. Manufacturing Hardware Implants from Idea to Mass Production - A Hacker's Journey
9. How to Better Fuzz Windows 10 Directx Kernel at Present
10. This is for the Pwners - Exploiting a WebKit 0-day in PlayStation 4
11. Portable Data exFiltration - XSS for PDFs
12. The Hunt for Major League IoT-ICS Threats - A Deep Dive into IoT Threat Terrain
13. How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration
14. IAM Concerned - OAuth Token Hijacking in Google Cloud (GCP)
15. Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control
16. Shield with Hole - New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy
17. Jack-in-the-Cache - A New Code injection Technique through Modifying X86-to-ARM Translation Cache
18. LadderLeak - Breaking ECDSA with Less than One Bit of Nonce Leakage
19. FPs are Cheap. Show me the CVEs!
20. BinTyper - Type Confusion Detection for C++ Binaries
21. Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel
22. POSWorld. Should You be Afraid of Hands-On Payment Devices
23. Fingerprint-Jacking - Practical Fingerprint Authorization Hijacking in Android Apps
24. Story of Jailbreaking iOS 13
25. The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study
26. Design Pitfalls in Commercial Mini-Programs on Android and iOS
27. efiXplorer - Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis
28. Quantum Security and Cryptography - You Are (Probably) Doing it Wrong
29. Effective Vulnerability Discovery with Machine Learning
30. It's not FINished - The Evolving Maturity in Ransomware Operations
31. How Embedded TCP_IP Stacks Breed Critical Vulnerabilities
32. My Ticks Don't Lie - New Timing Attacks for Hypervisor Detection
33. Hermes Attack - Steal DNN Models In AI Privatization Deployment Scenarios
34. A New Hope - The One Last Chance to Save Your SSD Data
35. Light Commands - Hacking Voice Assistants with Lasers
36. Precursor - Towards Evidence-Based Trust in Hardware
37. Hacking Government Cybersecurity
[Hidden content]