Saturday 21 October
Time | Track 1 (Event Room 1) | ||
---|---|---|---|
9:00AM |
Leveraging VMware's RPC Interface for Fun and ProfitZDI Team |
![]() |
![]() |
10:00AM |
Executives In The RedWayne Ronaldson |
![]() |
![]() |
11:00AM |
Embedding Defense in Server-Side ApplicationsFernando Arnaboldi |
![]() |
![]() |
12:00PM |
The .NET Inter-Operability OperationJames Forshaw |
![]() |
![]() |
2:00PM |
Chasing Ghosts In The WiresVitaly Kamluk |
![]() |
![]() |
3:00PM |
One-click Browser DefenseBrandon Dixon |
![]() |
![]() |
4:00PM |
HODOR: Holding Open Doors and Often ReconnectingRyan Holeman & Alek Amrani |
![]() |
![]() |
5:00PM |
Modern Reconnaissance Phase by APT – Protection LayerPaul Rascagneres & Warren Mercer |
![]() |
![]() |
Track 2 (Event Room 2) | |||
---|---|---|---|
![]() |
![]() |
||
Attacker Antics: Illustrations of IngenuityByrne Ghavalas & Bartosz Inglot |
![]() |
![]() |
|
How I Generically Bypassed CFGYang Junfeng (@bluerust) |
![]() |
![]() |
|
The Mechanized AnalystSteve Ginty |
![]() |
![]() |
|
Comparison and Improvements for Existing Jump Oriented Programming Tools John Dunlap |
![]() |
![]() |
|
The many Dimensions of RelationshipsTim Kornau |
![]() |
![]() |
|
Privacy and Big DataDr Vanessa Teague & Chris Culname |
![]() |
![]() |
|
A Whole New Efficient Fuzzing Strategy for Stagefright: Porting and OptimizationsZinuo Han |
![]() |
![]() |
Sunday 22 October
Time | Track 1 (Event Room 1) | ||
---|---|---|---|
10:00AM |
Hacking SkyNet - Anatomy of an intelligent Industrial Control SystemAaron Fenwick (multiplex3r) |
![]() |
![]() |
11:00AM |
Some Attack Surfaces For Telematics HardwareMinrui Yan & Mingge Cao |
![]() |
![]() |
12:00PM |
Improving Privacy on the WebPaul Theriault |
![]() |
![]() |
1:00PM |
Trick or XFLTReaT a.k.a. Tunnel All the ThingsBalazs Bucsay |
![]() |
![]() |
2:00PM |
The Active Directory BotnetTy Miller & Paul Kalinin |
![]() |
![]() |
3:00PM |
Look! Ransomware Is There: Large Scale Ransomware Detection with Naked EyeHsien-De Huang & Chia-Mu Yu |
![]() |
![]() |
Track 2 (Event Room 2) | ||
---|---|---|
User Session Recording - An Open Source SolutionFraser Tweedale |
![]() |
![]() |
Spring Dragon APT- A Case Study Of Targeted Attacks on APAC CountriesNoushin Shabab |
![]() |
![]() |
Neural Blacklist: Fighting Mutating Polymorphic URLsSean Park (Sparky) |
![]() |
![]() |
A Ghost from PostscriptYu Hong (Redrain) & Min (Spark) Zheng |
![]() |
![]() |