Star 0

Talks

Title Humans
3-DAY TRAINING 2 – Hardware Hacking with Hardsploit & Drones Julien Moinard , SERMA SAFETY AND SECURITY
XFLTReaT: A New Dimension in Tunnelling Balazs Bucsay , NCC Group
COMMSEC: Unstructured Data is the New Gold: ML + NLP is the New Shiz! Jim Geovedi
COMMSEC: Pwnrensics: How to Execute Code on a Forensic Workstation Florian Lukavsky , Wolfgang Ettlinger , SEC Consult Singapore , SEC Consult
MythBusters: CVE-2017-5689 – How We Broke Intel AMT Alexander Ermolov , Dmitriy Evdokimov , Maksim Malyutin , Embedi
COMMSEC: Stealing PLC Intellectual Property: A Red Teaming Story Matteo Beccaro , Opposing Force s.r.l.
COMMSEC: It’s Friday Evening Professor Moriarty Nicolas Collery , DBS Bank
COMMSEC: The Nightmare of Fragmentation: A Case Study of 200+ Vulnerabilities in Android Phones Bai Guangdong , Zhang Qing , Singapore Institute of Technology (SIT) , Xiaomi Inc.
Smart City / Smart Nation Panel Discussion Mark Curphey , Cesar Cerrudo , Eddie Schwartz , Matteo Beccaro , SourceClear , IOActive, Inc. , DarkMatter LLC , Opposing Force s.r.l.
Radio Exploitation 101: Characterizing, Contextualizing, and Applying Wireless Attack Methods Matt Knight , Marc Newlin , Bastille , Bastille Networks
COMMSEC: Hacking Robots Before Skynet Lucas Apa , Cesar Cerrudo , IOActive, Inc.
COMMSEC: Facebook: The Deep & Dark Web for Threat Actors in Asia Fadli B. Sidek , Control Risks
COMMSEC: AutoSec: Automotive Security Assessment Techniques and Tools from a Pentester’s Perspective Keisuke Hirata , NCC Group
Ro(o)tten Apples: Vulnerability Heaven in the iOS Sandbox Adam Donenfeld , Zimperium
KEYNOTE 1: Finding Vulnerabilities and Malware in Open-Source Code at Scale Mark Curphey , SourceClear
Spy vs. Spy: A Modern Study of Microphone Bugs Veronica Valeros , Sebastian Garcia
COMMSEC: Searching for a Needle in a Remote Haystack Vitaly Kamluk , Wayne Lee , Kaspersky Lab
3-DAY TRAINING 1 – Vulnerability Discovery and Triage Automation Richard Johnson , Cisco Talos Group
HITB + SOURCECLEAR TCP/IP NETWORKING PARTY
3-DAY TRAINING 4 – Practical Car Hacking Robert Leale , KC Johnson , CanBusHack
COMMSEC: Threat Hunting 101: Become the Hunter Hamza Beghal , MWR InfoSecurity
WELCOME ADDRESS: IoT – A Security Hole Without a Patch Earl Carter , Cisco Talos Group
COMMSEC: Insecurity in 2017: 0-days Are The Least of Our Problems Nick Biasini , Cisco Talos Group
A New Era of SSRF – Exploiting URL Parsers in Trending Programming Languages Orange Tsai , CHROOT , DEVCORE
COMMSEC: Hadoop Safari: Hunting for Vulnerabilities Thomas Debize , Mahdi Braik , Wavestone
A Year In The Red Dominic Chell , Vincent Yiu , MDSec
COMMSEC: 2FAssassin: Bypass 2FA, Stealing Private Keys, and More Maxwell Koh , Trustwave SpiderLabs
KEYNOTE 2: The State of Cyber: How Stealthier Attacks Are Blurring the Lines Between Cybercrime and Statecraft George Kurtz , CrowdStrike, Inc.
COMMSEC: Security Crowdsourcing: Growing Network Security Specialists for the Enterprise Xinhua Cai , 360 Enterprise Security Group
3-DAY TRAINING 3 – Making & Breaking Machine Learning Systems Clarence Chio , Anto Joseph , Shape Security , Intel Corporation
A Deep Dive into the Digital Weapons of the North Korean Cyber Army Ashley Shen , Moonbeom Park , Team T5 Inc , Korea
QEMU Attack Surface and Security Internals Qiang Li , ZhiBin Hu , Qihoo 360
Get to the Money: Hacking POS and POP Systems Dmitry Chastuhin , Vladimir Egorov , ERPScan
NeuralFuzz: Neural Networks for Fuzzing Web Apps Ivan Novikov , Wallarm Company
3-DAY SPECIAL TRAINING – ICS/SCADA Security Louis Hur , Edward Lee , Ellie Kim , NSHC
CLOSING KEYNOTE: A Spin Around the Block: 13 Years of Infosec Challenges Kelly Lum , HTTPS Czar @Tumblr
COMMSEC: The Original Elevat0r – History of a Private Jailbreak Stefan Esser , Antid0te UG
COMMSEC: Applying Intelligence and Counterintelligence Techniques to Cyber Network Operations Joseph Hesse , Kamal Ranjan , DarkMatter