3-DAY TRAINING 2 – Hardware Hacking with Hardsploit & Drones
|
Julien Moinard
,
SERMA SAFETY AND SECURITY
|
XFLTReaT: A New Dimension in Tunnelling
|
Balazs Bucsay
,
NCC Group
|
COMMSEC: Unstructured Data is the New Gold: ML + NLP is the New Shiz!
|
Jim Geovedi
|
COMMSEC: Pwnrensics: How to Execute Code on a Forensic Workstation
|
Florian Lukavsky
,
Wolfgang Ettlinger
,
SEC Consult Singapore
,
SEC Consult
|
MythBusters: CVE-2017-5689 – How We Broke Intel AMT
|
Alexander Ermolov
,
Dmitriy Evdokimov
,
Maksim Malyutin
,
Embedi
|
COMMSEC: Stealing PLC Intellectual Property: A Red Teaming Story
|
Matteo Beccaro
,
Opposing Force s.r.l.
|
COMMSEC: It’s Friday Evening Professor Moriarty
|
Nicolas Collery
,
DBS Bank
|
COMMSEC: The Nightmare of Fragmentation: A Case Study of 200+ Vulnerabilities in Android Phones
|
Bai Guangdong
,
Zhang Qing
,
Singapore Institute of Technology (SIT)
,
Xiaomi Inc.
|
Smart City / Smart Nation Panel Discussion
|
Mark Curphey
,
Cesar Cerrudo
,
Eddie Schwartz
,
Matteo Beccaro
,
SourceClear
,
IOActive, Inc.
,
DarkMatter LLC
,
Opposing Force s.r.l.
|
Radio Exploitation 101: Characterizing, Contextualizing, and Applying Wireless Attack Methods
|
Matt Knight
,
Marc Newlin
,
Bastille
,
Bastille Networks
|
COMMSEC: Hacking Robots Before Skynet
|
Lucas Apa
,
Cesar Cerrudo
,
IOActive, Inc.
|
COMMSEC: Facebook: The Deep & Dark Web for Threat Actors in Asia
|
Fadli B. Sidek
,
Control Risks
|
COMMSEC: AutoSec: Automotive Security Assessment Techniques and Tools from a Pentester’s Perspective
|
Keisuke Hirata
,
NCC Group
|
Ro(o)tten Apples: Vulnerability Heaven in the iOS Sandbox
|
Adam Donenfeld
,
Zimperium
|
KEYNOTE 1: Finding Vulnerabilities and Malware in Open-Source Code at Scale
|
Mark Curphey
,
SourceClear
|
Spy vs. Spy: A Modern Study of Microphone Bugs
|
Veronica Valeros
,
Sebastian Garcia
|
COMMSEC: Searching for a Needle in a Remote Haystack
|
Vitaly Kamluk
,
Wayne Lee
,
Kaspersky Lab
|
3-DAY TRAINING 1 – Vulnerability Discovery and Triage Automation
|
Richard Johnson
,
Cisco Talos Group
|
HITB + SOURCECLEAR TCP/IP NETWORKING PARTY
|
|
3-DAY TRAINING 4 – Practical Car Hacking
|
Robert Leale
,
KC Johnson
,
CanBusHack
|
COMMSEC: Threat Hunting 101: Become the Hunter
|
Hamza Beghal
,
MWR InfoSecurity
|
WELCOME ADDRESS: IoT – A Security Hole Without a Patch
|
Earl Carter
,
Cisco Talos Group
|
COMMSEC: Insecurity in 2017: 0-days Are The Least of Our Problems
|
Nick Biasini
,
Cisco Talos Group
|
A New Era of SSRF – Exploiting URL Parsers in Trending Programming Languages
|
Orange Tsai
,
CHROOT
,
DEVCORE
|
COMMSEC: Hadoop Safari: Hunting for Vulnerabilities
|
Thomas Debize
,
Mahdi Braik
,
Wavestone
|
A Year In The Red
|
Dominic Chell
,
Vincent Yiu
,
MDSec
|
COMMSEC: 2FAssassin: Bypass 2FA, Stealing Private Keys, and More
|
Maxwell Koh
,
Trustwave SpiderLabs
|
KEYNOTE 2: The State of Cyber: How Stealthier Attacks Are Blurring the Lines Between Cybercrime and Statecraft
|
George Kurtz
,
CrowdStrike, Inc.
|
COMMSEC: Security Crowdsourcing: Growing Network Security Specialists for the Enterprise
|
Xinhua Cai
,
360 Enterprise Security Group
|
3-DAY TRAINING 3 – Making & Breaking Machine Learning Systems
|
Clarence Chio
,
Anto Joseph
,
Shape Security
,
Intel Corporation
|
A Deep Dive into the Digital Weapons of the North Korean Cyber Army
|
Ashley Shen
,
Moonbeom Park
,
Team T5 Inc
,
Korea
|
QEMU Attack Surface and Security Internals
|
Qiang Li
,
ZhiBin Hu
,
Qihoo 360
|
Get to the Money: Hacking POS and POP Systems
|
Dmitry Chastuhin
,
Vladimir Egorov
,
ERPScan
|
NeuralFuzz: Neural Networks for Fuzzing Web Apps
|
Ivan Novikov
,
Wallarm Company
|
3-DAY SPECIAL TRAINING – ICS/SCADA Security
|
Louis Hur
,
Edward Lee
,
Ellie Kim
,
NSHC
|
CLOSING KEYNOTE: A Spin Around the Block: 13 Years of Infosec Challenges
|
Kelly Lum
,
HTTPS Czar @Tumblr
|
COMMSEC: The Original Elevat0r – History of a Private Jailbreak
|
Stefan Esser
,
Antid0te UG
|
COMMSEC: Applying Intelligence and Counterintelligence Techniques to Cyber Network Operations
|
Joseph Hesse
,
Kamal Ranjan
,
DarkMatter
|