Agenda

Talk Agenda

Tuesday 18 October 2016 (Talks)

Time Talks and Speakers
08:45 Registration open & refreshment
09:30  
10:15 Refreshment break
10:30  
11:15 Keynote: Stressed out? Denial of service attacks from the providers’ perspective (Alice Hutchings)
12:00 Lunch
13:00 Lightning talks
13:30 Exploiting and attacking seismological networks… remotely (Bertin Bervis Bonilla, James Jara)
14:15 Secrets in Soft Token: A security study of HID Global Soft Token (Mouad Abouhali)
15:00 KillTheHashes 30 million Malware DNA profiling exercise (Luciano Martins, Rodrigo Cetera, Javier Bassi)
15:45 Refreshment break
16:00 Unveiling the attack chain of Russian-speaking cybercriminals (Wayne Huang, Sun Huang)
16:45 Of Mice and Keyboards: On the Security of Modern Wireless Desktop Sets (Matthias Deeg and Gerhard Klostermeier)
17:30 Windows systems & code signing protection (Paul Rascagnères)
18:15 Cyber Grand Shellphish: Shellphish and the DARPA Cyber Grand Challenge (Kevin Borgolte)

Wednesday 19 October 2016 (Talks)

Time Talks and Speakers
08:45 The Metabrik Platform: Rapid Development of Reusable Security Tools (Patrice Auffret)
09:30 2016: The Infosec Crossroads (Saumil Shah)
10:15 Refreshment break
10:30 Exploit generation and JavaScript analysis automation with WinDBG (Fitzl Csaba, Miklos Desbordes-Korcsev)
11:15 Keynote: A Network of Sorrows: Small Adversaries and Small Allies (Quinn Norton)
12:00 Lunch
13:00 Lightning talks
13:30 Exploiting new default accounts in SAP systems (Joris van de Vis)
14:15 badGPO - Using GPOs for Persistence and Lateral Movement (Yves Kraft, Immanuel Willi)
15:00 Machine Duping: Pwning Deep Learning Systems (Clarence Chio)
15:45 Refreshment break
16:00 Credential Assessment: Mapping Privilege Escalation at Scale (Matt Weeks)
16:45 When Crypto Fails ( Yaniv Balmas, Ben Herzog)
17:30 Bootstrapping an Architectural Research Platform (Jacob I. Torrey)
18:15 Hadoop safari : Hunting for vulnerabilities (Thomas DEBIZE and Mahdi BRAIK)

Thursday 20 October 2016 (Talks)

Time Talks and Speakers
08:45 BtleJuice: the Bluetooth Smart Man In The Middle Framework (Damien Cauquil)
09:30 Where should I host my malware? (Attila Marosi)
10:15 Refreshment break
10:30 Interesting Malware - No, I’m not kidding… (Marion Marschalek)
11:15 Keynote: Enhancing infrastructure cybersecurity in Europe (Rossella Mattioli)
12:00 Lunch
13:00 Lightning talks
13:30 House intercoms attacks: when frontdoors become backdoors (Sébastien Dudek)
14:15 When Practice Informs Technology (Mahsa Alimardani)
15:00 Bridging political gaps with code (Okhin)
15:45 Refreshment break
16:00 WiFi Exploitation: How passive interception leads to active exploitation (Solomon Sonya)
16:45 Fraud detection and forensics on telco networks (Vladimir Kropotov and Dmitry Kurbatov)
17:30 The Legend of Windows: A Link to the Hash (m4xk and sıx)
18:15  

Workshop Agenda

Tuesday 18 October 2016 (Workshops)

Time Hollenfels Echternach - Diekirch
13:00 Lightning talks Lightning talks
13:30 Advanced exploitation: ROP and protections bypass under Linux (Julien Bachmann) ca. 4 h Introduction to Security Onion (David Szili) ca. 3 h
15:45 Refreshment break Refreshment break
16:00 workshop continued workshop continued
18:00 end of workshop  

Wednesday 19 October 2016 (Workshops)

Time Hollenfels Echternach - Diekirch Wiltz
09:00      
09:30 Malware Triage IOCs - Using Open Data to Help Develop Robust Indicators (Sergei Frankoff, Sean Wilson) ca. 2 h The Fantastic 4 … forensic domains: net, disk, mem, mal (David Durvaux, Christophe Vandeplas) ca. 2 h A Hands On Introduction To Software Defined Radio FULL
10:15 Refreshment break Refreshment break Refreshment break
10:30 continue workshop continue workshop continue workshop
12:00 Lunch break Lunch break  
13:00 Lightning talks Lightning talks Lightning talks
13:30 Android malware reverse engineering (Axelle Apvrille) ca. 3 h Introduction to Security Onion (David Szili) ca. 3 h How to play YoYo like a boss
15:45 Refreshment break Refreshment break Refreshment break
16:00 workshop continued workshop continued workshop continued
18:00 end of workshop    

Thursday 20 October 2016 (Workshops)

Time Hollenfels Echternach - Diekirch
09:00    
09:30 ARM Shellcode Basics (Saumil Shah) Malware analysis made easy with Volatility plugins (Thomas Chopitea)
10:15 Refreshment break Refreshment break
10:30 workshop continued workshop continued
12:00 Lunch break Lunch break
13:30 FastIR Collector (Sébastien Larinier) ca. 2 h Nothing is beyond our pots - An Introductory Worskhop about Honeypots (Guillaume Arcas)
15:45 Refreshment break Refreshment break
16:00 end of workshop workshop continued
18:00   end of workshop

Monday 17 October 2016 (Special interest pre-hack meeting)

Time Room Title
14:00 - 18:00 Hollenfels MISP summit