Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'DeepSec' | www.SecurityPhresh.com
Security News from 'DeepSec'
Showing 'Security News from 'DeepSec'' from 31 to 40
DeepSec2017 - Lock, Stock And Two Smoking Apples - XNU Kernel Security
4th Jan 2018 [one year ago] from DeepSec
This talk will aim to cover the research which has been undertaken following on from the Defcon presentation on MWRs platform agnostic kernel fuzzing, to automatically identify critical flaws within Apple macOS. It was observed that there...
ROOTS 2017 - Paying The Price For Disruption: A FinTech Allowed Account Takeover
4th Jan 2018 [one year ago] from DeepSec
In this paper, we look at N26, a pan-European banking startup and the poster child for young FinTechs, to see how security is treated by startups that provide disruptive technologies in the financial sector. We find out that, in an area...
ROOTS 2017 - A Survey On Automated Dynamic Malware Analysis Evasion And Counter-Evasion: PC, Mobile, And Web
4th Jan 2018 [one year ago] from DeepSec
Automated dynamic malware analysis systems are important in combating the proliferation of modern malware. Unfortunately, malware can often easily detect and evade these systems. Competition between malware authors and analysis system developers...
ROOTS 2017 - Enhancing Control Flow Graph Based Binary Function Identification
4th Jan 2018 [one year ago] from DeepSec
Detection of binary functions in compiled code is a major stepping stone towards any advanced binary analysis technique. Nucleus [1] is a novel algorithm based on the idea of using the interprocedural control flow graph to detect function...
ROOTS 2017 - On The (In-)Security Of JavaScript Object Signing And Encryption
4th Jan 2018 [one year ago] from DeepSec
JavaScript Object Notation (JSON) has evolved to the de-facto standard file format in the web used for application configuration, cross- and same-origin data exchange, as well as in Single Sign-On (SSO) protocols such as OpenID Connect....
ROOTS 2017 - Out-Of-Order Execution As A Cross-VM Side Channel And Other Applications
4th Jan 2018 [one year ago] from DeepSec
Given the rise in popularity of cloud computing and platform-as-a-service, vulnerabilities, inherent to systems which share hardware resources, will become increasingly attractive targets to malicious software authors. In this paper, we...
« Newer 1 2 3 4