BlueHat IL 2022 - Jonathan Bar Or (JBO) - Learning macOS Security by Finding Vulns
BlueHat IL 2022 - Samuel Groß & Ian Beer - A Brief History of iMessage Exploitation
BlueHat IL 2022 - Saar Amar - Security Analysis of MTE Through Examples
BlueHat IL 2022 - Tal Be'ery & Shalev Keren - Web3 Security: The Blockchain is Your SIEM
BlueHat IL 2022 - Niv Yehezkel - A primer on cross-chain bridges and how to break one
BlueHat IL 2022 - Stav Shulman & Yuri Rozhansky - Focusing on the Fjords
BlueHat IL 2022 - Andrew Morris - Staying Ahead of Internet Background Exploitation
BlueHat IL 2022 - Sharon Brizinov - Pwn'ing Cloud-Based Intercoms at Scale
BlueHat IL 2022 - Diane Dubois - Hyntrospect: a fuzzer for Hyper-V devices
BlueHat IL 2022 - Gil Dabah - Smash The Ref - A Design Flaw in Windows Kernel
BlueHat IL 2022
BlueHat IL 2022 - Adam Morrison - An Analysis of Speculative Type Confusion Vulnerabilities
BlueHat IL 2022 - Tzah Pahima - Breaking Formation
BlueHat IL 2022 - Antonio Cocomazzi & Andrea Pierini - Relaying to Greatness
BlueHat IL 2020 - Gal De Leon - Exploiting Errors in Windows Error Reporting
BlueHat IL 2019 - Andrew "bunnie" Huang - Supply Chain Security: "If I were a Nation State...”
BlueHat IL 2023 - Lidor Ben Shitrit & Roee Sagi - CosMiss & FabriXss
BlueHat IL 2023 - Diane Dubois & Julien Bachmann - Virtual machines on Kubernetes pods
BlueHat IL 2018 John Lambert The New Paradigm of Security Controls
BlueHat IL 2019 - Ido Li On & Uri Farkas - The AMDFlaws Story: Technical Deep Dive