Star 0

Talks

Title Humans
3-DAY TRAINING 3 – Source Code Auditing Like a Ninja Joern Schneeweisz , Recurity Labs
COMMSEC: RedPhishing: Wi-Fi, Phishing and Red Teaming Matteo Beccaro , Opposing Force s.r.l.
COMMSEC: Cognitive Automation with Machine Learning in Cybersecurity Rishi Kant
COMMSEC: KLara: Your New Friend Dan Demeter , Kaspersky Lab
Is The Pen Mightier Than The Sword? A First Look Into The Security of The Apple Pencil and the Apple SmartKeyboard Stefan Esser , Antid0te UG
KEYNOTE 2: OK Computer: Machine Learning in Cybersecurity Alexander Polyakov , ERPScan
A Year of Purple Ryan Shepherd , Countercept
3-DAY TRAINING 6 – Mastering Burp Suite Pro: 100% Hands-On Nicolas Gregoire
3-DAY TRAINING 2 – Modern Malware Warfare: Basics, Delivery, and Advanced Analysis Dr. Jared DeMott , Josh Stroschein , VDA Labs
COMMSEC: The Trails of WINDSHIFT APT Taha Karim , DarkMatter LLC
COMMSEC: Using Machine Learning to Identify Security Issues in Open-Source Libraries Asankhaya Sharma , CA Veracode
COMMSEC: Data-Centric Cyber Threat Impact Analyser for IoT and Manufacturing Simon Eng , Lim Eng Woei , Nanyang Polytechnic
Ghost in the Locks: Owning Electronic Locks Without Leaving a Trace Tomi Tuominen , Timo Hirvonen , F-Secure
COMMSEC: Internet of Things: Battle of the Bots Rommel D. Joven , Fortinet, Inc.
COMMSEC: Brain Surgery: Breaking Full Disk Encryption Vitaly Kamluk , Nicolas Collery , Kaspersky Lab , DBS Bank
Viewer Discretion Advised: (De)coding an iOS Vulnerability Adam Donenfeld , Zimperium
3-DAY TRAINING 4 – Threat Intelligence Gathering Using Maltego Paul Richards , Paterva
CLOSING NOTE / LOCK NOTE Philippe Viola , DarkMatter LLC
PANEL DISCUSSION: Zero Seconds to Midnight: The 0-Day Market The Grugq , Matteo Beccaro , Cristofaro Mune , Nicolas Collery , Andrea Zapparoli Manzoni , Sam Goh , Comae , Opposing Force s.r.l. , DBS Bank , Crowdfense , Booz Allen Hamilton
NFC Payments: The Art of Relay & Replay Attacks Salvador Mendoza , Women in Tech Fund
3-DAY TRAINING 5 – Pentesting the Modern Application Stack Bharadwaj Machiraju , Francis Alexander , LinkedIn , Envestnet | Yodlee
Bicycle Day: Hacking BLE Bicycle Locks for Fun and (a Small) Profit Vincent Tan , MWR InfoSecurity
COMMSEC: Hacking Mobile Games: Closing the Gap between “Ikan Bilis” and “Whales” Nicholas Lim , Vantage Point Security
COMMSEC: Demystifying the Definitions of the Surface, Deep and Dark Web Fadli B. Sidek , Division Zero
COMMSEC TRACK REGISTRATION OPENS COMMSEC TRACK REGISTRATION OPENS
From Assembly to JavaScript and Back: Turning Memory Errors into Code Execution with Client-Side Compilers Robert Gawlik , Ruhr-University Bochum
COMMSEC: Surprise Rant 2.0 Joern Schneeweisz , Recurity Labs
COMMSEC: SayaKenaHack: Breach Notification in Malaysia Keith Rozario
COMMSEC: Learning How to Smurf with Honeypots Emil Tan , Edgis
COMMSEC: Securing ICS/SCADA: Defense in Depth Mike Rebultan , Equinix
KEYNOTE 1: (in)Security is Eating the World Michael Coates , Altitude Networks
Traversing the Kill-Chain: The New Shiny in 2018 Vincent Yiu , SYON
CLOSING KEYNOTE: Rethinking the Cyber Kill Chain Alexis Lavi , Bank of America
COMMSEC: Blockchain and Smart Contract Attack Vectors Jorden Seet , SMU
FILE Structures: Another Binary Exploitation Technique An-Jie Yang (Angelboy) , HITCON CTF Team , CHROOT
Exploiting Automation in LTE Mobile Networks Ravishankar Borgaonkar , Altaf Shaik , University of Oxford , Kaitiaki Labs
COMMSEC: Deep Hooks: Monitoring Native Execution in WoW64 Applications Assaf Carlsbad , Yarden Shafir , SentinelOne
COFFEE BREAK / EXHIBITION OPENS COFFEE BREAK / EXHIBITION OPENS
COMMSEC: Generic and Static Detection of Mobile Malware Using Machine Learning Minh Tran , Fortinet, Inc.
GOD MODE UNLOCKED: Hardware Backdoors in x86 CPUs Christopher Domas , Finite State
3-DAY TRAINING 7 – Hacking Mobile Networks with Software Defined Radios Lin Huang , Qihoo 360
3-DAY TRAINING 1 – The ARM Exploit Laboratory Saumil Shah , SK Chong , Net-Square , ASK Pentest
COMMSEC: Software Security Era: Past, Present, and Back To The Future Nafiez , Jaan Yeh , Hack In The Box
The Road to iOS Sandbox Escape Rani Idan , Zimperium