Schedule

Saturday 21 October

Time Track 1 (Event Room 1)

9:00AM

Leveraging VMware's RPC Interface for Fun and Profit
ZDI Team

10:00AM

Executives In The Red
Wayne Ronaldson

11:00AM

Embedding Defense in Server-Side Applications
Fernando Arnaboldi

12:00PM

The .NET Inter-Operability Operation
James Forshaw

2:00PM

Chasing Ghosts In The Wires
Vitaly Kamluk

3:00PM

One-click Browser Defense
Brandon Dixon

4:00PM

HODOR: Holding Open Doors and Often Reconnecting
Ryan Holeman & Alek Amrani

5:00PM

Modern Reconnaissance Phase by APT – Protection Layer
Paul Rascagneres & Warren Mercer

Track 2 (Event Room 2)

In Soviet Russia, Radare2 Debugs You!
John Bird

Attacker Antics: Illustrations of Ingenuity
Byrne Ghavalas & Bartosz Inglot

How I Generically Bypassed CFG
Yang Junfeng (@bluerust)

The Mechanized Analyst
Steve Ginty

Comparison and Improvements for Existing Jump Oriented Programming Tools
John Dunlap

The many Dimensions of Relationships
Tim Kornau

Privacy and Big Data
Dr Vanessa Teague & Chris Culname

A Whole New Efficient Fuzzing Strategy for Stagefright: Porting and Optimizations
Zinuo Han

Sunday 22 October

Time Track 1 (Event Room 1)

10:00AM

Hacking SkyNet - Anatomy of an intelligent Industrial Control System
Aaron Fenwick (multiplex3r)

11:00AM

Some Attack Surfaces For Telematics Hardware
Minrui Yan & Mingge Cao

12:00PM

Improving Privacy on the Web
Paul Theriault

1:00PM

Trick or XFLTReaT a.k.a. Tunnel All the Things
Balazs Bucsay

2:00PM

The Active Directory Botnet
Ty Miller & Paul Kalinin

3:00PM

Look! Ransomware Is There: Large Scale Ransomware Detection with Naked Eye
Hsien-De Huang & Chia-Mu Yu

Track 2 (Event Room 2)

User Session Recording - An Open Source Solution
Fraser Tweedale

Spring Dragon APT- A Case Study Of Targeted Attacks on APAC Countries
Noushin Shabab

Neural Blacklist: Fighting Mutating Polymorphic URLs
Sean Park (Sparky)

A Ghost from Postscript
Yu Hong (Redrain) & Min (Spark) Zheng