Agenda
Talk Agenda
Tuesday 18 October 2016 (Talks)
Time | Talks and Speakers |
---|---|
08:45 | Registration open & refreshment |
09:30 | |
10:15 | Refreshment break |
10:30 | |
11:15 | Keynote: Stressed out? Denial of service attacks from the providers’ perspective (Alice Hutchings) |
12:00 | Lunch |
13:00 | Lightning talks |
13:30 | Exploiting and attacking seismological networks… remotely (Bertin Bervis Bonilla, James Jara) |
14:15 | Secrets in Soft Token: A security study of HID Global Soft Token (Mouad Abouhali) |
15:00 | KillTheHashes 30 million Malware DNA profiling exercise (Luciano Martins, Rodrigo Cetera, Javier Bassi) |
15:45 | Refreshment break |
16:00 | Unveiling the attack chain of Russian-speaking cybercriminals (Wayne Huang, Sun Huang) |
16:45 | Of Mice and Keyboards: On the Security of Modern Wireless Desktop Sets (Matthias Deeg and Gerhard Klostermeier) |
17:30 | Windows systems & code signing protection (Paul Rascagnères) |
18:15 | Cyber Grand Shellphish: Shellphish and the DARPA Cyber Grand Challenge (Kevin Borgolte) |
Wednesday 19 October 2016 (Talks)
Time | Talks and Speakers |
---|---|
08:45 | The Metabrik Platform: Rapid Development of Reusable Security Tools (Patrice Auffret) |
09:30 | 2016: The Infosec Crossroads (Saumil Shah) |
10:15 | Refreshment break |
10:30 | Exploit generation and JavaScript analysis automation with WinDBG (Fitzl Csaba, Miklos Desbordes-Korcsev) |
11:15 | Keynote: A Network of Sorrows: Small Adversaries and Small Allies (Quinn Norton) |
12:00 | Lunch |
13:00 | Lightning talks |
13:30 | Exploiting new default accounts in SAP systems (Joris van de Vis) |
14:15 | badGPO - Using GPOs for Persistence and Lateral Movement (Yves Kraft, Immanuel Willi) |
15:00 | Machine Duping: Pwning Deep Learning Systems (Clarence Chio) |
15:45 | Refreshment break |
16:00 | Credential Assessment: Mapping Privilege Escalation at Scale (Matt Weeks) |
16:45 | When Crypto Fails ( Yaniv Balmas, Ben Herzog) |
17:30 | Bootstrapping an Architectural Research Platform (Jacob I. Torrey) |
18:15 | Hadoop safari : Hunting for vulnerabilities (Thomas DEBIZE and Mahdi BRAIK) |
Thursday 20 October 2016 (Talks)
Time | Talks and Speakers |
---|---|
08:45 | BtleJuice: the Bluetooth Smart Man In The Middle Framework (Damien Cauquil) |
09:30 | Where should I host my malware? (Attila Marosi) |
10:15 | Refreshment break |
10:30 | Interesting Malware - No, I’m not kidding… (Marion Marschalek) |
11:15 | Keynote: Enhancing infrastructure cybersecurity in Europe (Rossella Mattioli) |
12:00 | Lunch |
13:00 | Lightning talks |
13:30 | House intercoms attacks: when frontdoors become backdoors (Sébastien Dudek) |
14:15 | When Practice Informs Technology (Mahsa Alimardani) |
15:00 | Bridging political gaps with code (Okhin) |
15:45 | Refreshment break |
16:00 | WiFi Exploitation: How passive interception leads to active exploitation (Solomon Sonya) |
16:45 | Fraud detection and forensics on telco networks (Vladimir Kropotov and Dmitry Kurbatov) |
17:30 | The Legend of Windows: A Link to the Hash (m4xk and sıx) |
18:15 |
Workshop Agenda
Tuesday 18 October 2016 (Workshops)
Time | Hollenfels | Echternach - Diekirch |
---|---|---|
13:00 | Lightning talks | Lightning talks |
13:30 | Advanced exploitation: ROP and protections bypass under Linux (Julien Bachmann) ca. 4 h | Introduction to Security Onion (David Szili) ca. 3 h |
15:45 | Refreshment break | Refreshment break |
16:00 | workshop continued | workshop continued |
18:00 | end of workshop |
Wednesday 19 October 2016 (Workshops)
Time | Hollenfels | Echternach - Diekirch | Wiltz |
---|---|---|---|
09:00 | |||
09:30 | Malware Triage IOCs - Using Open Data to Help Develop Robust Indicators (Sergei Frankoff, Sean Wilson) ca. 2 h | The Fantastic 4 … forensic domains: net, disk, mem, mal (David Durvaux, Christophe Vandeplas) ca. 2 h | A Hands On Introduction To Software Defined Radio FULL |
10:15 | Refreshment break | Refreshment break | Refreshment break |
10:30 | continue workshop | continue workshop | continue workshop |
12:00 | Lunch break | Lunch break | |
13:00 | Lightning talks | Lightning talks | Lightning talks |
13:30 | Android malware reverse engineering (Axelle Apvrille) ca. 3 h | Introduction to Security Onion (David Szili) ca. 3 h | How to play YoYo like a boss |
15:45 | Refreshment break | Refreshment break | Refreshment break |
16:00 | workshop continued | workshop continued | workshop continued |
18:00 | end of workshop |
Thursday 20 October 2016 (Workshops)
Time | Hollenfels | Echternach - Diekirch |
---|---|---|
09:00 | ||
09:30 | ARM Shellcode Basics (Saumil Shah) | Malware analysis made easy with Volatility plugins (Thomas Chopitea) |
10:15 | Refreshment break | Refreshment break |
10:30 | workshop continued | workshop continued |
12:00 | Lunch break | Lunch break |
13:30 | FastIR Collector (Sébastien Larinier) ca. 2 h | Nothing is beyond our pots - An Introductory Worskhop about Honeypots (Guillaume Arcas) |
15:45 | Refreshment break | Refreshment break |
16:00 | end of workshop | workshop continued |
18:00 | end of workshop |
Monday 17 October 2016 (Special interest pre-hack meeting)
Time | Room | Title |
---|---|---|
14:00 - 18:00 | Hollenfels | MISP summit |