Star 0


Title Humans
The Phantom Menace: Intel ME Manufacturing Mode Maxim Goryachy , Mark Ermolov , Postive Technologies , Positive Technologies
NTLM Relay Is Dead, Long Live NTLM Relay Jianing Wang , Junyu Zhou , Tencent Security Xuanwu Lab
COMMSEC: Improved Blockchain Infrastructure with IoT for Critical/Smart Government Applications Dr. Manar Abu Talib , Dr. Qassim Nasir , College of Sciences at the University of Sharjah , University Of Sharjah
COMMSEC: Building Security Beyond The Genesis Block Ryan Shepherd , Countercept
DHCP Is Hard Felix Wilhelm , Google Inc.
BSIDES: Adversarial Attacks on Autonomous Cars: The Missed Gap Dr. Hoda A. Alkhzaimi , New York University AD
BSIDES: Creating Browser Extensions to Hunt for Low-Hanging Fruit Rewanth Cool , Payatu Software Labs LLP
COMMSEC: Offensive Memory Forensics Hugo Teso
COMMSEC: Evolution of Security Threats to Telecommunications Infrastructures Emmanuel Gadaix , TSTF
BSIDES: Growth Hacking Your Community Dr. Marwan Al-Zarouni , DESC
CLOSING KEYNOTE: Blind Digital Signatures (BDS) Dr. Manar Abu Talib , Dr. Qassim Nasir , College of Sciences at the University of Sharjah , University Of Sharjah
Hunting for Backdoors in IoT Firmware at Unprecedented Scale John Toterhi , Finite State
Vote of No Confidence: Second Factor Correctness Victor Mateu , DarkMatter
Spanish Fly: Infecting Files On-The-Fly Leonardo Nve , Spanish Red Team
Somebody Answer the Phone: Hacking Telephone Systems for Fun & Profit Himanshu Mehta , Sachin Wagh , Symantec
COMMSEC: Hacking the International RFQ Process #killthebuzzwords Dino Covotsos , Telspace Systems
COMMSEC: Taking Over Telecom Networks Loay Hassan Abdelrazek , Hardik Mehta , Nile University
BSIDES: Women in Cyber Security in The Middle East Heide Young , Women in Cyber Security Middle East
AI Model Security: Reverse Engineering Machine Learning Models Kang Li , Institute for Cybersecurity and Privacy at the University of Georgia
Capture This: Real Time Packet Processing with FPGAs Matteo Collura , Knowledge Resources GmbH
Back On The Chain Gang: Blockchain, Public Chain and Contract Security Li Jiafeng , Yang Changcheng , Qihoo 360 Technology Co., Ltd
COMMSEC: Hacking the 0day Market Andrea Zapparoli Manzoni , Crowdfense
KEYNOTE 2: Cyber Arms Race Mikko Hypponen , F-Secure
Virtualizing IoT With Code Coverage Guided Fuzzing Kai Jern Lau , JD Security , Nguyen Anh Quynh
TRAINING 11 – ICS/SCADA Security Ellie Kim , Edward Lee , Red Alert Team at NSHC , NSHC
Using Machine-Learning to Investigate Web Campaigns at Large Federico Maggi , Trend Micro, Inc.
TRAINING 9 – Hands-on SAP Hacking and Defense Jordan Santarsieri , Vicxer
BSIDES: Hunting Threats in Your Enterprise Abdulrahman Alnimari , Mantech Corp
It WISN’t Me: Attacking Industrial Wireless Mesh Networks Mattijs van Ommeren , Erwin Paternotte , NIXU Benelux , NIXU Corporation
IPv666 – Address of the Beast Marc Newlin , Chris Grayson , Snap Inc.
Are You Listening? Auditable & Provable Privacy of Smart Speakers Wang Kang , Yang Bo , Alibaba Group Holding Limited , China Telecommunication Technology Labs
TRAINING 2 – Mobile-Sec Exploitation Breakout Ravikumar Paghdal , Net Square
GLitch Chronicles: Turning WebGL Into A Hammer Pietro Frigo , Vrije Universiteit Amsterdam
TRAINING 6 – In & Out: Network Data Exfiltration Techniques Leszek Mis , Defensive Security
COMMSEC: Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding Vikash Yadav , Royal Bank of Canada
Horror On The Bus: Hacking COMBUS Kirils Solovjovs , Possible Security
HITB 10th Year Anniversary Lucky Draw: WIN A TRIP TO AMSTERDAM!
COMMSEC: HWallet: The Simple Cryptocurrency Hardware Wallet Nemanja Nikodijevic
TRAINING 4 – Defending Against Modern Targeted Attacks Stan Hegt , Pieter Ceelen , Marc Smeets , Outflank
BSIDES: Cyber Security of the Future Dr. Bushra AlBelooshi , Dubai Electronic Security Center (DESC)
TRAINING 7 – Advanced Windows Fuzzing and Triage Richard Johnson , Cisco Talos Group
Rooting Routers Using Symbolic Execution Mathy Vanhoef , KU Leuven University
COMMSEC: A Secured and Robust Wireless Communication System for Low-Latency Applications Dr. Husameldin Mukhtar , University of Dubai
Gold Digging: Discovering Hidden Gems in APKs Marc Schoenefeld , Oracle
TRAINING 1: The ARM IoT Exploit Lab: Introduction to ARM IoT Exploitation and Shellcoding Saumil Shah , Net-Square
TRAINING 3 – System Management Mode Rootkits Alexander Tereshkin , COSEINC
BSIDES: Blockchain: The New Line of Defense Ramy AlDamati , Kaspersky Lab
COMMSEC: Gentlehackers – Start Your AIs: Building Your Own Self Driving, Self Racing Car Dhillon ‘L33tdawg’ Kannabhiran , Hack In The Box
IoT Woodpecker: Intrusion-Detection On The Hardware Bus Congyuan Xu , Yang Bo , Wang Kang , Zhejiang University , China Telecommunication Technology Labs , Alibaba Group Holding Limited
COMMSEC: Hacking into Broadband and Broadcast TV Systems Chaouki Kasmi , Thomas Sabono , Pierre Barre , DarkMatter
Cloudy With a Chance of Messages: Extracting Messages from iCloud Vladimir Katalov , ElcomSoft
TRAINING 8 – Get Your Hands Dirty: From Packets to Malware Behaviors Veronica Valeros , Sebastian Garcia
BSIDES: My Experience of Running CTF Competitions in 7 Arab Countries Moataz Salah , CyberTalent
WELCOME ADDRESS H.E Yousuf Hamad Al Shaibani , Dubai Electronic Security Center (DESC)
A Multidimensional Hardware Attack and Defense Tool Set Kunzhe Chai , Jie Fu , Mingchuang Qin , 360PegasusTeam , PegasusTeam , 360 Radio Security Research Institute
COMMSEC: Hacking Yachts Remotely: IoT Hacking at Sea Stephan Gerling
COMMSEC: System-level Threats: Dangerous Assumptions in Modern Product Security Cristofaro Mune
KEYNOTE 1: Crouching Tiger, Sudden Keynote Katie Moussouris , Luta Security
TRAINING 5 – Applied Data Science and Machine Learning for Cyber Security Austin Taylor , Charles Givre , Deutsche Bank
TRAINING 10: Modern Malware Warfare: Basics, Delivery, and Advanced Analysis Dr. Jared DeMott , Josh Stroschein , VDA Labs