3-DAY TRAINING 3 – Source Code Auditing Like a Ninja
|
Joern Schneeweisz
,
Recurity Labs
|
COMMSEC: RedPhishing: Wi-Fi, Phishing and Red Teaming
|
Matteo Beccaro
,
Opposing Force s.r.l.
|
COMMSEC: Cognitive Automation with Machine Learning in Cybersecurity
|
Rishi Kant
|
COMMSEC: KLara: Your New Friend
|
Dan Demeter
,
Kaspersky Lab
|
Is The Pen Mightier Than The Sword? A First Look Into The Security of The Apple Pencil and the Apple SmartKeyboard
|
Stefan Esser
,
Antid0te UG
|
KEYNOTE 2: OK Computer: Machine Learning in Cybersecurity
|
Alexander Polyakov
,
ERPScan
|
A Year of Purple
|
Ryan Shepherd
,
Countercept
|
3-DAY TRAINING 6 – Mastering Burp Suite Pro: 100% Hands-On
|
Nicolas Gregoire
|
3-DAY TRAINING 2 – Modern Malware Warfare: Basics, Delivery, and Advanced Analysis
|
Dr. Jared DeMott
,
Josh Stroschein
,
VDA Labs
|
COMMSEC: The Trails of WINDSHIFT APT
|
Taha Karim
,
DarkMatter LLC
|
COMMSEC: Using Machine Learning to Identify Security Issues in Open-Source Libraries
|
Asankhaya Sharma
,
CA Veracode
|
COMMSEC: Data-Centric Cyber Threat Impact Analyser for IoT and Manufacturing
|
Simon Eng
,
Lim Eng Woei
,
Nanyang Polytechnic
|
Ghost in the Locks: Owning Electronic Locks Without Leaving a Trace
|
Tomi Tuominen
,
Timo Hirvonen
,
F-Secure
|
COMMSEC: Internet of Things: Battle of the Bots
|
Rommel D. Joven
,
Fortinet, Inc.
|
COMMSEC: Brain Surgery: Breaking Full Disk Encryption
|
Vitaly Kamluk
,
Nicolas Collery
,
Kaspersky Lab
,
DBS Bank
|
Viewer Discretion Advised: (De)coding an iOS Vulnerability
|
Adam Donenfeld
,
Zimperium
|
3-DAY TRAINING 4 – Threat Intelligence Gathering Using Maltego
|
Paul Richards
,
Paterva
|
CLOSING NOTE / LOCK NOTE
|
Philippe Viola
,
DarkMatter LLC
|
PANEL DISCUSSION: Zero Seconds to Midnight: The 0-Day Market
|
The Grugq
,
Matteo Beccaro
,
Cristofaro Mune
,
Nicolas Collery
,
Andrea Zapparoli Manzoni
,
Sam Goh
,
Comae
,
Opposing Force s.r.l.
,
DBS Bank
,
Crowdfense
,
Booz Allen Hamilton
|
NFC Payments: The Art of Relay & Replay Attacks
|
Salvador Mendoza
,
Women in Tech Fund
|
3-DAY TRAINING 5 – Pentesting the Modern Application Stack
|
Bharadwaj Machiraju
,
Francis Alexander
,
LinkedIn
,
Envestnet | Yodlee
|
Bicycle Day: Hacking BLE Bicycle Locks for Fun and (a Small) Profit
|
Vincent Tan
,
MWR InfoSecurity
|
COMMSEC: Hacking Mobile Games: Closing the Gap between “Ikan Bilis” and “Whales”
|
Nicholas Lim
,
Vantage Point Security
|
COMMSEC: Demystifying the Definitions of the Surface, Deep and Dark Web
|
Fadli B. Sidek
,
Division Zero
|
COMMSEC TRACK REGISTRATION OPENS
|
COMMSEC TRACK REGISTRATION OPENS
|
From Assembly to JavaScript and Back: Turning Memory Errors into Code Execution with Client-Side Compilers
|
Robert Gawlik
,
Ruhr-University Bochum
|
COMMSEC: Surprise Rant 2.0
|
Joern Schneeweisz
,
Recurity Labs
|
COMMSEC: SayaKenaHack: Breach Notification in Malaysia
|
Keith Rozario
|
COMMSEC: Learning How to Smurf with Honeypots
|
Emil Tan
,
Edgis
|
COMMSEC: Securing ICS/SCADA: Defense in Depth
|
Mike Rebultan
,
Equinix
|
KEYNOTE 1: (in)Security is Eating the World
|
Michael Coates
,
Altitude Networks
|
Traversing the Kill-Chain: The New Shiny in 2018
|
Vincent Yiu
,
SYON
|
CLOSING KEYNOTE: Rethinking the Cyber Kill Chain
|
Alexis Lavi
,
Bank of America
|
COMMSEC: Blockchain and Smart Contract Attack Vectors
|
Jorden Seet
,
SMU
|
FILE Structures: Another Binary Exploitation Technique
|
An-Jie Yang (Angelboy)
,
HITCON CTF Team
,
CHROOT
|
Exploiting Automation in LTE Mobile Networks
|
Ravishankar Borgaonkar
,
Altaf Shaik
,
University of Oxford
,
Kaitiaki Labs
|
COMMSEC: Deep Hooks: Monitoring Native Execution in WoW64 Applications
|
Assaf Carlsbad
,
Yarden Shafir
,
SentinelOne
|
COFFEE BREAK / EXHIBITION OPENS
|
COFFEE BREAK / EXHIBITION OPENS
|
COMMSEC: Generic and Static Detection of Mobile Malware Using Machine Learning
|
Minh Tran
,
Fortinet, Inc.
|
GOD MODE UNLOCKED: Hardware Backdoors in x86 CPUs
|
Christopher Domas
,
Finite State
|
3-DAY TRAINING 7 – Hacking Mobile Networks with Software Defined Radios
|
Lin Huang
,
Qihoo 360
|
3-DAY TRAINING 1 – The ARM Exploit Laboratory
|
Saumil Shah
,
SK Chong
,
Net-Square
,
ASK Pentest
|
COMMSEC: Software Security Era: Past, Present, and Back To The Future
|
Nafiez
,
Jaan Yeh
,
Hack In The Box
|
The Road to iOS Sandbox Escape
|
Rani Idan
,
Zimperium
|