Star 0

Talks

Title Humans
Exploit Kits: Hunting the Hunters Nick Biasini , Cisco Talos Group
Adaptive Android Kernel Live Patching Tim Xia , Yulong Zhang , Baidu Inc.
Go Speed Tracer: Guided Fuzzing Richard Johnson , Cisco Talos Group
2-DAY TRAINING 5: Pentesting and Securing IPv6 Networks Marc Heuse , The Hackers Choice (THC.org)
2-DAY TRAINING 2: Hacking the IoT with Software Defined Radio Dr. Bob Baxley , Balint Seeber , Bastille Networks
SandJacking: Profiting from iOS Malware Chilik Tamir , Mi3 Security
Attacking Next-Generation Firewalls: Breaking PAN-OS Felix Wilhelm , ERNW GmbH
In Plain Sight: The Perfect Exfiltration Itzik Kotler , Amit Klein , SafeBreach
New Methods for Exploiting ORM Injections in Java Applications Mikhail Egorov , Sergey Soldatov , Odin (Ingram Micro Cloud)
WELCOME ADDRESS: Cybersecurity: A Dance Between Governments, Companies and Hacker Communities Patricia M. Zorko MPA , Deputy National Coordinator for Security and Counterterrorism and Director Cyber Security
CANsee: An Automobile Intrusion Detection System Jun Li , Qihoo360 Unicorn Team
3-DAY TRAINING 3: Advanced LTE Security Philippe Langlois , P1 Security
3-DAY TRAINING 1: The ARM Exploit Laboratory Saumil Shah , SK Chong , Net-Square , ASK Pentest
CommSec Track: Pentesting ChatOps Melanie Rieback , Radically Open Security
HITB Lab: Electronic Access Control Security Matteo Beccaro , Opposing Force s.r.l.
2-DAY TRAINING 3: Powershell for Penetration Testers Nikhil Mittal
In Stickers We Trust: Breaking Naive ESSID/WPA2 Key Generation Algorithms Peter ‘blasty’ Geissler
IRON-HID: Create Your Own Bad USB Device Seunghun Han , National Security Research Institute of South Korea
Escape From The Docker-KVM-QEMU Machine Shengping Wang , Xu Liu , Qihoo 360
Time is On My Side: Forging a Wireless Time Signal to Attack NTP Servers Yuwei Zheng , Haoqi Shan , Qihoo360 Unicorn Team , Unicorn Team
HITB Lab: Mobile Application Security for iOS and Android Tony Trummer , Tushar Dalvi , LinkedIn
CommSec Track: Exploiting GLIBC: Hacking Everything (CVE-2015-7547) Gal De Leon , Nadav Markus , Palo Alto Networks
CommSec Track: Applying Regulatory Data to IoT/RF Reverse Engineering Marc Newlin , Bastille Networks
HITB Lab: Droid-FF: The First Android Fuzzing Framework Anto Joseph , Citrix
CommSec Track: A Series of Unfortunate Events: Where Malware Meets Murphy Mattijs van Ommeren , NIXU
CommSec Track: Inspeckage – Android Package Inspector Antonio Martins , Tempest Security Intelligence
Cache Side Channel Attacks: CPU Design as a Security Problem Anders Fogh , Protect Software GmbH
CommSec Track: Unformation in the Era of Hyper Connectivity Elisabeth De Leeuw , IdTopIQ
CommSec Track: HITC – Hack in The Class Barry ‘Fish’ van Kampen , RandomData
HITB Lab: Hardware Security – Buses, Protocols and Oscilloscopes Anibal Sacco , Federico Muttis , Cubica Labs
CommSec Track: Park This – Yet Another Parking Meter Talk Paul Moreno , Uber
KEYNOTE 1 – Beyond FBI vs Apple: What’s Next for the Crypto Wars? John Adams , Bolt Financial
Hardsploit Project: An All-In-One Tool for Hardware Security Audits Yann Allain , Julien Moinard , OPALE SECURITY
CommSec Track: Don’t Feed the Hippos Martin Knobloch
Kernel Exploit Hunting and Mitigation Broderick Aquilino , Wayne Low , F-Secure , Fortinet Inc.
2-DAY TRAINING 7: Hacking Web Applications: Case Studies of Award-Winning Bugs in Google, Yahoo, Mozilla and More Dawid Czagan , Silesia Security Lab
3-DAY TRAINING 2: The Art of Escape Eric Michaud , Brian O’Shea , Rift Recon
Forcing a Targeted LTE Cellphone into an Eavesdropping Network Lin Huang , Qihoo360 Unicorn Team
CLOSING KEYNOTE – The Bad Neighbor: Hardware Side Channels in Virtualized Environments Sophia D’Antoine , Trail of Bits
CommSec Track: Facebook Presents Capture The Flag: A Look At Our New Open-Source Platform Paul Marinescu , Facebook
2-DAY TRAINING 6: SAP Cyber Security Dmitry Chastuhin , Mathieu Geli , ERPScan , SAP Threat Intelligence at ERPScan
TeLeScope: Peering Into the Depths of TLS Traffic in Real-Time Radu Caragea , Bitdefender
2-DAY TRAINING 4: Advanced Web Hacking Fionnbharr Davies , Luke Jahnke , Exploitable Labs , Bitcoin CTF
HITB Lab: Vulnerability Discovery Using Machine Learning Gustavo Grieco , Argentina
Using the Observer Effect & Cyber Feng Shui Jacob Torrey , Assured Information Security
KEYNOTE 2 – The Future Has Arrived and it’s Effin’ Hilarious! Adam Laurie , Aperture Labs
Perf: From Profiling to Kernel Exploiting Wish Wu , Trend Micro, Inc.
CSP Oddities Michele Spagnuolo , Lukas Weichselbaum , Google Inc.
Advanced Exploitation: Xen Hypervisor VM Escape Shangcong Luan , Alibaba Group Holding Limited
CommSec Track: Anatomy of an APT Attack Paul Mason
2-DAY TRAINING 1: Mobile Application Hackers Handbook: Live Edition Dominic Chell , MDSec
Virtualization System Vulnerability Discovery Framework Tang Qinghao , Qihoo 360 Virtualization Security Team