Saturday 22 October
Time | Track 1 (Event Room 1) | ||
---|---|---|---|
9:00AM |
![]() |
![]() |
|
10:00AM |
![]() |
![]() |
|
11:00AM |
On Her Majesty’s Secret Service – GRX and a Spy Agency Stephen Kho |
![]() |
![]() |
12:00PM |
Turncoat! An Insider's Guide To Attacking Container TechnologyTrevor Jay |
![]() |
![]() |
2:00PM |
Measuring RiskRon Gula |
![]() |
![]() |
3:00PM |
Forcing A Targeted LTE Cellphone Into An Unsafe NetworkWanqiao Zhang & Qing Yang |
![]() |
![]() |
4:00PM |
Hacker-Machine Interface - State of the Union for SCADA HMI VulnerabilitiesBrian Gorenc |
![]() |
![]() |
5:00PM |
Writing Malware While The Blue Team Is Staring At YouRob Fuller |
![]() |
![]() |
Track 2 (Event Room 2) | |||
---|---|---|---|
Documented to FailJames Forshaw |
![]() |
![]() |
|
Demystifying the Secure Enclave ProcessorTarjei "kernelpool" Mandt |
![]() |
![]() |
|
Fuzzflow Framework and Windows Guided FuzzingRichard Johnson |
![]() |
![]() |
|
Make iOS App more Robust and Security through FuzzingWei Wang & Zhaowei Wang |
![]() |
![]() |
|
Strolling into Ring-0 via I/O Kit DriversPatrick Wardle |
![]() |
![]() |
|
Leaking Windows Kernel PointersWanderingGlitch |
![]() |
![]() |
|
Exploiting COF Vulnerabilities In The Linux KernelVitaly Nikolenko |
![]() |
![]() |
|
Windows Metafiles: An Analysis of the EMF Attack Surface & Recent VulnerabilitiesMateusz "j00ru" Jurczyk |
![]() |
![]() |
Sunday 23 October
Time | Track 1 (Event Room 1) | ||
---|---|---|---|
10:00AM |
PHP Internals: Exploit Dev EditionEmmanuel Law |
![]() |
![]() |
11:00AM |
Of Mice and Keyboards: On the Security of Modern Wireless Desktop SetsMatthias Deeg & Gerhard Klostermeier |
![]() |
![]() |
12:00PM |
Orbiting The Saturn: Investigating A Decades-Old DRM SystemJames Laird-Wah |
![]() |
![]() |
1:00PM |
AWS regrets: Gremlins in your Cloud SuccessDaniel Grzelak & Mike Fuller |
![]() |
![]() |
2:00PM |
You Just Got Popped.. That's Cool Bro, Your Friend the nightHawk Is WatchingDaniel Eden & Roshan Maskey |
![]() |
![]() |
3:00PM |
Active Incident ResponseBrian Candlish & Christian Teutenberg |
![]() |
![]() |
Track 2 (Event Room 2) | ||
---|---|---|
Fighting Metamorphism using Deep Neural Network with FourierSean Park |
![]() |
![]() |
Breaking out of QEMUQiang Li & Zhibin Hu |
![]() |
![]() |
Make Event Tracing Great AgainNate Rogers & Ben Lelonek |
![]() |
![]() |
NANA |
![]() |
![]() |
Rainbow Over the Windows: More Colors Than You Could ExpectPeter Hlavaty & Jin Long |
![]() |
![]() |
FRAPL - Next Generation Reverse Engineering FrameworkAlex Hude & Max Bazaliy |
![]() |
![]() |