Difference between revisions of "Schedule"
From BruCON 2017
Line 43: | Line 43: | ||
* Defeating Proprietary Protocols the Smart Way - Georges Bossert and Frédéric Guihéry | * Defeating Proprietary Protocols the Smart Way - Georges Bossert and Frédéric Guihéry | ||
* Practical Machine Learning in InfoSecurity - Anto Joseph, Clarence Chio | * Practical Machine Learning in InfoSecurity - Anto Joseph, Clarence Chio | ||
− | * Playing with RFID workshop - Vinnie Vanhoecke, Tom Kustermans, Joachim | + | * Playing with RFID workshop - Vinnie Vanhoecke, Tom Kustermans, Joachim Schäfers |
* Windows malware development: A JMP in the dark - Yannick Wellens | * Windows malware development: A JMP in the dark - Yannick Wellens |
Revision as of 13:48, 15 June 2017
General Information
- Registrations start at 8h30!
- Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
- Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
- Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
- Read our important instructions on how to use SCHED.org!
- This schedule is subject to change, check back regularly.
Keynotes:
- Keynote: The cyber short. A market solution for product safety and corporate governance. - Justine Bone
- Keynote: How hackers changed the security industry and how we need to keep changing it. - Chris Wysopal
Talks:
- See no evil, hear no evil: Hacking invisibly and silently with light and sound - Matt Wixey
- XFLTReaT: a new dimension in tunnelling - Balazs Bucsay
- Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape. - Anna Shirokova, Veronica Valeros
- Exploiting IoT Devices over Software Defined Radio, ZigBee, WiFi and BLE - Swaroop Yermalkar
- Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) - Sampada Nandedkar, Rushikesh Nandedkar
- Weaponizing the BBC Micro:Bit - Damien Cauquil
- Secure channels: Building real world crypto systems - Sander Demeester
- MEATPISTOL, A Modular Malware Implant Framework - Josh Schwartz, John Cramb
- Open Source Security Orchestration - Gregory Pickett
- Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis - František Střasák and Sebastian Garcia
- Evading Microsoft ATA for Active Directory Domination - Nikhil Mittal
- Browser Exploits? Grab them by the collar! - Debasish Mandal
Workshops:
- Programming Wireshark With Lua - Didier Stevens
- Getting the Most Out of Windows Event Logs - David Szili
- Building a cheap, robust, scaling, penetration testing/bug bounty super computer - Steven Wierckx, Andy Deweirt
- Practical iOS App Exploitation and Defense using iGoat - Swaroop Yermalkar
- Malware Triage: Malscripts Are The New Exploit Kit - Sergei Frankoff, Sean Wilson
- Jedi's trick to convince your boss and colleagues - Emmanuel Nicaise
- May the data stay with you - Network Data Exfiltration Techniques. - Leszek Mis
- Hacking Bluetooth Smart locks - Slawomir Jasek
- Defeating Proprietary Protocols the Smart Way - Georges Bossert and Frédéric Guihéry
- Practical Machine Learning in InfoSecurity - Anto Joseph, Clarence Chio
- Playing with RFID workshop - Vinnie Vanhoecke, Tom Kustermans, Joachim Schäfers
- Windows malware development: A JMP in the dark - Yannick Wellens