Star 0

Talks

Title Humans
COMMSEC: Somebody Call a Doctor: Hacking a Hospital for Fun and Profit Asaf Cohen , Ofir Kamil , Maglan
COMMSEC: Keynterceptor: Press Any Key to Continue Niels van Dijkhuizen , CSIRT
COMMSEC: Steganography Ante Portas Steffen Wendzel , Worms University of Applied Sciences
Mirror Mirror: Rooting Android 8 with a Kernel Space Mirroring Attack Yong Wang , Yang Song , Alibaba Group Holding Limited
3-DAY TRAINING 2: Modern Malware Warfare: Basics, Delivery, and Advanced Analysis Dr. Jared DeMott , Josh Stroschein , VDA Labs
COMMSEC: Smart Contract (In)Security Ben Schmidt , PolySwarm
The Odd One: Applying Machine Learning to User Behavior Anomaly Analysis Eugene Neyolov , ERPScan
COMMSEC: Digging Deep: How to Find and Exploit Bugs in IoT Devices Kelvin Wong
TRAINING 3 – Making and Breaking Machine Learning Systems Clarence Chio , Shape Security
Look Ma, No Win32_Process Needed: Expanding Your WMI Lateral Movement Arsenal Philip Tsukerman , Cybereason Innovation Team
Yoga for Hackers: Aligning your (Chakra) Core Nadira Mohsin
From Quantitative Change to Qualitative Change – A New Fuzzing Method for Android Zhang Qing , Bai Guangdong , Xiaomi Inc. , Singapore Institute of Technology
COMMSEC: Privacy and Protection for Criminals: Behaviors and Patterns of Rogue Hosting Providers Sarah Brown , Dhia Mahjoub , Security Links , Cisco Umbrella (OpenDNS)
Mind the Gap: Uncovering the Android Patch Gap Through Binary-Only Patch Level Analysis Karsten Nohl , Jakob Lell , SRLabs
HITB LAB: Wireless Hacking with HackCUBE Yunding Jian , Jie Fu , Chaoran Wang , Qihoo 360 Technology Co., Ltd
Defense-in-Depth Techniques for Modern Web Applications and Google’s Journey with CSP Michele Spagnuolo , Lukas Weichselbaum , Google Inc.
3-DAY TRAINING 4 – Source Code Auditing Like a Ninja Joern Schneeweisz , Stefan Seefeldt , Recurity Labs
HITB LAB: From Zero to ARM Assembly Bind Shellcode Maria ‘Azeria’ Markstedter , Azeria Labs
HITB LAB: A Hands On Introduction To Software Defined Radio Didier Stevens , NVISO
Reference This: Sandbox Evasion Using VBA Referencing Aviv Grafi , Amit Dori , Votiro
Sneaky Element: Real World Attacks Against Secure Elements Don Bailey , Lab Mouse Security
Yoga for Hackers: Aligning your (Chakra) Core Nadira Mohsin
Ghost Tunnel: Covert Data Exfiltration Channel to Circumvent Air Gapping Jun Li , Kunzhe Chai , Hongjian Cao , Qihoo 360 Technology Co., Ltd
Hacking Intelligent Buildings: Pwning KNX & ZigBee Networks HuiYu Wu , YuXiang Li , Yong Yang , Tencent Blade Team , Tencent Security Platform Department
KEYNOTE 2: A Risk Assessment of Logo Disclosures Jennifer Leggio , Flashpoint
WELCOME ADDRESS: Hacks, Sticks, and Carrots: Improving Incentives for Cybersecurity Michel van Eeten , Delft University of Technology
3-DAY TRAINING 6: Out Of The Blue: Attacking BLE, NFC, HCE and More Slawomir Jasek , SecuRing
COMMSEC: PyREBox: Making Dynamic Instrumentation Great Again Xabier Ugarte-Pedrero , Cisco Talos Group
Smashing Ethereum Smart Contracts for Fun and ACTUAL Profit Bernhard Mueller , Consensys
COMMSEC: The Sound of a Targeted Attack: Attacking IoT Speakers Stephen Hilt , Trend Micro, Inc.
3-DAY TRAINING 1: The ARM Exploit Laboratory Saumil Shah , SK Chong , Net-Square , ASK Pentest
Fuzzing Javascript Engines for Fun and Pwnage Areum Lee , Jeonghoon Shin , Sejong University , B.o.B Program
COMMSEC: Creating an Isolated Data Center Security Policy Model Using SmartNICs Ofir Arkin , Mellanox Technologies
Brida: When Burp Suite meets Frida Federico Dotta , Piergiovanni Cipolloni , @Mediaservice.net S.r.l.
COMMSEC: Faster, Wider, Greater: Modern Pentest Tricks Thomas Debize , Wavestone
Seems Exploitable: Exposing Hidden Exploitable Behaviors Using Extended Differential Fuzzing Fernando Arnaboldi , IOActive, Inc.
COMMSEC: ProdSec: A Technical Approach Jeremy Brown , NVIDIA
In Through The Out Door: Backdooring & Remotely Controlling Cars With The Bicho Sheila Ayelen Berta , Claudio Caracciolo , Eleven Paths , ElevenPaths
Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) Daniel Bohannon , Mandiant
COMMSEC: Under Cover of Darkness: Hiding Tasks via Hardware Task Switching Kyeong Joo Jung , Stonybrook University
COMMSEC: Practical Quantum Computing for Hackers Without a PhD Yann Allain , SERMA SAFETY AND SECURITY
COMMSEC: Still Breaching Your Perimeter – A Deep Dive Into Malicious Documents Josh Stroschein , VDA Labs
COMMSEC: The Life & Death of Kernel Object Abuse Saif ElSherei , Ian Kronquist , Microsoft Corporation , Microsoft Security Response Center (MSRC)
Mallet: Towards a Generic Intercepting Proxy Rogan Dawes , SensePost
HITB LAB: Friends, Romans, Countrymen – Lend Me Your kernel_task Port Jonathan Levin , Technologeeks
Call Me Maybe: Establishing Covert Channels By Abusing GSM AT Commands Alfonso Munoz , Jorge Cuadrado Saez , Innovation 4 Security - BBVA Group
CLOSING KEYNOTE: Security is What We Make of It – Blockchain and Beyond Amber Baldet , J.P. Morgan
3-DAY TRAINING 5 – Pentesting & Exploiting Highly Secured Enterprise Networks Vikram Salunke , Vmaskers
3-DAY TRAINING 7: Mastering Burp Suite Pro: 100% Hands-On Nicolas Gregoire
COMMSEC: EasyROP: Automatic Generation of ROP Chains Using a Turing-Complete Instruction Set Ricardo J. Rodríguez , Daniel Uroz , Centro Universitario de la Defensa
Ticket to Ride: Abusing The Travel and Hospitality Industry for Profit Vladimir Kropotov , Fyodor Yarochkin , Mayra Fuentes , Lion Gu , Trend Micro, Inc.
GSEC LUCKY DRAW: Win a trip to Singapore
Facebook Security Invite-Only Evening
Eating The Core of an Apple: How to Analyze and Find Bugs in MacOS and iOS Kernel Drivers Xiaolong Bai , Min (Spark) Zheng , Alibaba Group Holding Limited
KEYNOTE 1: The Future, The Past, and … Wait, Where the Hell are We Now? Marion Marschalek , Intel Corporation
HITB LAB: Predicting Malicious Domains Using Convolutional Neural Networks David Rodriguez , Jingchuan Chen , Dhia Mahjoub , Cisco Umbrella (OpenDNS)
HITB TCP/IP Party (sponsored by NIXU)
Over The Edge: Pwning The Windows Kernel Rancho Han , Tencent Zhanlu Lab
Attacking Microsoft’s .NET Framework Through CLR Yu Hong , Shikang Xing , Qihoo 360CERT