Infiltrate Security Conference

2018
Archives
See presentations of past Infiltrate Conferences

INFILTRATE 2017

2017 Video Collection

Keynote: Beset on All Sides: A Realistic Take on Life in the Defensive Trenches

Justin Schuh Video

Logic Bug Hunting in Chrome on Android

Georgi Geshev / Robert Miller Slides

802.11 Protocol Chaos

Andres Blanco Video

Sierra Had a Little Lamb

Stephanie Archibald Slides / Video

Be a Binary Rockstar

Sophia d’Antoine / Peter LaFosse / Rusty Wagner Slides / Video

Forget Enumerating a Network, Hack the SIEM and Win the War

John Grigg Slides

Did I hear a shell popping in your baseband?

Ralf-Philipp Weinmann

COM in Sixty Seconds! (well minutes more likely)

James Forshaw Slides / Video

BugID - Automated Bug Analysis

Berend-Jan Wever Slides

Remotely Compromising a Modern iOS Device

Marco Grassi / Liang Chen

Cloud Post Exploitation Techniques

Andrew Johnson / Sacha Faust PDF / PPTX / Video

The Shadow Over Android

Vasilis Tsaousoglou / Patroklos Argyroudis Slides

Hunting for Vulnerabilities in Signal

Jean-Philippe Aumasson / Markus Vervier

INFILTRATE 2016

2016 Video Collection

Keynote: Learning to win

Nate Fick Video

Pwning Adobe Reader

Sebastian Apelt
Slides / Video

Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts

Omer Coskun Slides / Video

Making a scalable automated hacking system: from DevOps to Pwning

Artem Dinaburg Slides / Video

The Tao of Hardware, the Te of Implants

Joseph FitzPatrick

Automatic Root-Cause Identification for Crashing Executions

Sean Heelan Slides / Video

Java deserialization vulnerabilities - The forgotten bug class

Matthias Kaiser Slides

Genetic Malware: Designing Payloads For Specific Targets

Travis Morrow / Josh Pitts Slides / Demo 1 / Demo 2 / Demo 3 / Video

The Secret Life of ActionScript

Natalie Silvanovich Slides / Video

Swift Reversing

Ryan Stortz Slides / Video

All Your Browsers Belong To Us : Tales of Android Browser Exploitation

Benjamin Watson Slides / Video

Xenpwn: Breaking Paravirtualized Devices

Felix Wilhelm Slides / Video

Hack the Pentagon

Lisa Wiswell

INFILTRATE 2015

2015 Video Collection

Keynote: Abyss or Turning Point: Strategy, Skills and Tradecraft in the Age of 21st Century Warfare

Ray Boisvert Video

Insection: AWEsomely Exploiting Shared Memory Objects

Alex Ionescu Video

Data Driven Offense

Ram Shankar / Sacha Faust Video

Modern Objective-C Exploitation

Neil Archibald Video

James Forshaw Video

Hacking Games in a Hacked Game

Rusty Wagner / Jordan Wiens Video

Technical Keynote: Practical Attacks on DOCSIS

Braden Thomas Video

Problems in Symbolic Fuzzing

Nathan Rittenhouse Video

MIMOSAWRITERROUTER - Abusing EPC on Cisco Router to collect data

Joaquim Espinhara / Rafael Silva Video

Writing Bad@ss OS X Malware

Patrick Wardle Video

HARES: Hardened Anti-Reverse Engineering System

Jacob Torrey Video

Fuzzing OSX At Scale

Ben Nagy Video

The Shadow Over Firefox

Patroklos Argyroudis Slides

INFILTRATE 2014

Full schedule (PDF): Day 1 / Day 2 / 2014 Video Collection

Keynote: Life at Both Ends of the Barrel: An NSA Targeting Retrospective

Richard “Dickie” George Video

Ghosts of Christmas Past: Fuzzing Language Interpreters Using Regression Tests

Sean Heelan Slides

Analytics, And Scalability, And UEFI Exploitation! Oh My!

Teddy Reed Video

A Curious Cyber War: Business Owners vs. Investors

Suzanne E. Kecmer Video

Python, Deflowered: Shangrila

Christos Kalkanis PDF

INFILTRATE 2013

Full schedule (PDF): Day 1 / Day 2 / 2013 Video Collection

Keynote: Chris Eagle

Chris Eagle Video

Keynote: Stephen Watt

Stephen Watt Video

Enterprise Malware: There Is Always A Way

Alberto Garcia Illera Video

Exfiltrate

Miguel Turner Video

Jurassic Jar: Their World, Our Rules

Esteban Guillardoy Video

Advanced Heap Manipulation in Windows 8

Zhenhua (Eric) Liu Video

INFILTRATE 2012

Keynote: Thomas Lim

Thomas Lim Video

Keynote: Andrew Cushman

Andrew Cushman
Video

Effective Denial of Service attacks against web application platforms

Alexander Klink / Julian Waelde PDF

A Heap of Trouble: Breaking the Linux Kernel SLOB Allocator

Dan Rosenberg PDF

Modern Static Security Checking For C / C++ Programs

Julien Vanegue PDF

Secrets in Your Pocket

Mark Wuergler Prezi / Video

Unearthing the World’s Best Bugs

Michel Aubizzierre PDF

INFILTRATE 2011

Android Attacks

Bas Alberts / Massimiliano Oldani PDF

Attacking the WebKit Heap

Agustin Gianni / Sean Heelan PDF

Bypassing Windows Services Protections

Cesar Cerrudo PDF

Don’t Give Credit: Hacking Arcade Machines

Ronald Huizer PDF

Exploitation and State Machines

Thomas Dullien / Halvar Flake PDF

The Listening

Esteban Guillardoy PDF

Modern Kernel Pool Exploitation

Tarjei Mandt PDF

Stackjacking Your Way to grsecurity/PaX Bypass

Jon Oberheide / Dan Rosenberg PDF

Strategic Surprise

Nico Waisman PDF

SPONSORS

Click on the images below to visit the sponsor’s homepage. Click here if you want to become a sponsor for INFILTRATE 2018.

Immunity Inc.
Trail of Bits
Grimm