Thursday 24 October
| Time | Presentation | Speaker | ||
|---|---|---|---|---|
|
9:00AM |
Building Antibodies - The Phishing program at Twitter |
|
Dan Tentler |
|
|
10:10AM |
Morning Tea |
|||
|
10:30AM |
Hacking, Surveilling, and Deceiving victims on Smart TV |
|
SeungJin Lee |
|
|
11:30AM |
The Political Economy of the Cyber-security and Malware Markets |
|
Michael Sulmeyer |
|
|
12:30PM |
Lunch |
|||
|
1:30PM |
Malware, Sandboxing and You: How Enterprise Malware and 0day Detection is About To Fail (Again) |
|
Jonathan Brossard |
|
|
2:30PM |
Advanced iOS Kernel Debugging for Exploit Developers |
|
Stefan Esser |
|
|
3:30PM |
Afternoon Tea |
|||
|
3:45PM |
Bypassing All of the Things |
|
Aaron Portnoy |
|
|
4:45PM |
The Mathematics of Wonton Burrito Meals |
|
Snare |
|
|
7:00PM |
Party |
Friday 25 October
| Time | Presentation | Speaker | ||
|---|---|---|---|---|
|
9:00AM |
A Whirlwind Tour of Academic Techniques for Real-World Security Researchers |
|
Silvio Cesare |
|
|
10:10AM |
Morning Tea |
|||
|
10:30AM |
Hot-Wiring of the Future: Exploring Car CAN Buses! |
|
Ted Sumers & Grayson Zulauf |
|
|
11:30AM |
APT1: Technical Backstage |
|
Paul Rascagneres |
|
|
12:30PM |
Lunch |
|||
|
1:30PM |
LOBO: Scalable Covert Malware Analysis |
|
Danny Quist |
|
|
2:30PM |
BIOS Chronomancy |
|
John Butterworth |
|
|
3:30PM |
Afternoon Tea |
|||
|
3:45PM |
The Forger's Art: Exploiting XML Digital Signature Implementations |
|
James Forshaw |
|
|
4:45PM |
Hard Disks: More Than Just Block Devices |
|
Jeroen Domburg |
|