Exploit Kits: Hunting the Hunters
|
Nick Biasini
,
Cisco Talos Group
|
Adaptive Android Kernel Live Patching
|
Tim Xia
,
Yulong Zhang
,
Baidu Inc.
|
Go Speed Tracer: Guided Fuzzing
|
Richard Johnson
,
Cisco Talos Group
|
2-DAY TRAINING 5: Pentesting and Securing IPv6 Networks
|
Marc Heuse
,
The Hackers Choice (THC.org)
|
2-DAY TRAINING 2: Hacking the IoT with Software Defined Radio
|
Dr. Bob Baxley
,
Balint Seeber
,
Bastille Networks
|
SandJacking: Profiting from iOS Malware
|
Chilik Tamir
,
Mi3 Security
|
Attacking Next-Generation Firewalls: Breaking PAN-OS
|
Felix Wilhelm
,
ERNW GmbH
|
In Plain Sight: The Perfect Exfiltration
|
Itzik Kotler
,
Amit Klein
,
SafeBreach
|
New Methods for Exploiting ORM Injections in Java Applications
|
Mikhail Egorov
,
Sergey Soldatov
,
Odin (Ingram Micro Cloud)
|
WELCOME ADDRESS: Cybersecurity: A Dance Between Governments, Companies and Hacker Communities
|
Patricia M. Zorko MPA
,
Deputy National Coordinator for Security and Counterterrorism and Director Cyber Security
|
CANsee: An Automobile Intrusion Detection System
|
Jun Li
,
Qihoo360 Unicorn Team
|
3-DAY TRAINING 3: Advanced LTE Security
|
Philippe Langlois
,
P1 Security
|
3-DAY TRAINING 1: The ARM Exploit Laboratory
|
Saumil Shah
,
SK Chong
,
Net-Square
,
ASK Pentest
|
CommSec Track: Pentesting ChatOps
|
Melanie Rieback
,
Radically Open Security
|
HITB Lab: Electronic Access Control Security
|
Matteo Beccaro
,
Opposing Force s.r.l.
|
2-DAY TRAINING 3: Powershell for Penetration Testers
|
Nikhil Mittal
|
In Stickers We Trust: Breaking Naive ESSID/WPA2 Key Generation Algorithms
|
Peter ‘blasty’ Geissler
|
IRON-HID: Create Your Own Bad USB Device
|
Seunghun Han
,
National Security Research Institute of South Korea
|
Escape From The Docker-KVM-QEMU Machine
|
Shengping Wang
,
Xu Liu
,
Qihoo 360
|
Time is On My Side: Forging a Wireless Time Signal to Attack NTP Servers
|
Yuwei Zheng
,
Haoqi Shan
,
Qihoo360 Unicorn Team
,
Unicorn Team
|
HITB Lab: Mobile Application Security for iOS and Android
|
Tony Trummer
,
Tushar Dalvi
,
LinkedIn
|
CommSec Track: Exploiting GLIBC: Hacking Everything (CVE-2015-7547)
|
Gal De Leon
,
Nadav Markus
,
Palo Alto Networks
|
CommSec Track: Applying Regulatory Data to IoT/RF Reverse Engineering
|
Marc Newlin
,
Bastille Networks
|
HITB Lab: Droid-FF: The First Android Fuzzing Framework
|
Anto Joseph
,
Citrix
|
CommSec Track: A Series of Unfortunate Events: Where Malware Meets Murphy
|
Mattijs van Ommeren
,
NIXU
|
CommSec Track: Inspeckage – Android Package Inspector
|
Antonio Martins
,
Tempest Security Intelligence
|
Cache Side Channel Attacks: CPU Design as a Security Problem
|
Anders Fogh
,
Protect Software GmbH
|
CommSec Track: Unformation in the Era of Hyper Connectivity
|
Elisabeth De Leeuw
,
IdTopIQ
|
CommSec Track: HITC – Hack in The Class
|
Barry ‘Fish’ van Kampen
,
RandomData
|
HITB Lab: Hardware Security – Buses, Protocols and Oscilloscopes
|
Anibal Sacco
,
Federico Muttis
,
Cubica Labs
|
CommSec Track: Park This – Yet Another Parking Meter Talk
|
Paul Moreno
,
Uber
|
KEYNOTE 1 – Beyond FBI vs Apple: What’s Next for the Crypto Wars?
|
John Adams
,
Bolt Financial
|
Hardsploit Project: An All-In-One Tool for Hardware Security Audits
|
Yann Allain
,
Julien Moinard
,
OPALE SECURITY
|
CommSec Track: Don’t Feed the Hippos
|
Martin Knobloch
|
Kernel Exploit Hunting and Mitigation
|
Broderick Aquilino
,
Wayne Low
,
F-Secure
,
Fortinet Inc.
|
2-DAY TRAINING 7: Hacking Web Applications: Case Studies of Award-Winning Bugs in Google, Yahoo, Mozilla and More
|
Dawid Czagan
,
Silesia Security Lab
|
3-DAY TRAINING 2: The Art of Escape
|
Eric Michaud
,
Brian O’Shea
,
Rift Recon
|
Forcing a Targeted LTE Cellphone into an Eavesdropping Network
|
Lin Huang
,
Qihoo360 Unicorn Team
|
CLOSING KEYNOTE – The Bad Neighbor: Hardware Side Channels in Virtualized Environments
|
Sophia D’Antoine
,
Trail of Bits
|
CommSec Track: Facebook Presents Capture The Flag: A Look At Our New Open-Source Platform
|
Paul Marinescu
,
Facebook
|
2-DAY TRAINING 6: SAP Cyber Security
|
Dmitry Chastuhin
,
Mathieu Geli
,
ERPScan
,
SAP Threat Intelligence at ERPScan
|
TeLeScope: Peering Into the Depths of TLS Traffic in Real-Time
|
Radu Caragea
,
Bitdefender
|
2-DAY TRAINING 4: Advanced Web Hacking
|
Fionnbharr Davies
,
Luke Jahnke
,
Exploitable Labs
,
Bitcoin CTF
|
HITB Lab: Vulnerability Discovery Using Machine Learning
|
Gustavo Grieco
,
Argentina
|
Using the Observer Effect & Cyber Feng Shui
|
Jacob Torrey
,
Assured Information Security
|
KEYNOTE 2 – The Future Has Arrived and it’s Effin’ Hilarious!
|
Adam Laurie
,
Aperture Labs
|
Perf: From Profiling to Kernel Exploiting
|
Wish Wu
,
Trend Micro, Inc.
|
CSP Oddities
|
Michele Spagnuolo
,
Lukas Weichselbaum
,
Google Inc.
|
Advanced Exploitation: Xen Hypervisor VM Escape
|
Shangcong Luan
,
Alibaba Group Holding Limited
|
CommSec Track: Anatomy of an APT Attack
|
Paul Mason
|
2-DAY TRAINING 1: Mobile Application Hackers Handbook: Live Edition
|
Dominic Chell
,
MDSec
|
Virtualization System Vulnerability Discovery Framework
|
Tang Qinghao
,
Qihoo 360 Virtualization Security Team
|