Difference between revisions of "Schedule"
From BruCON 2017
(→General Information) |
|||
Line 1: | Line 1: | ||
__NOTOC__ | __NOTOC__ | ||
− | |||
− | |||
− | |||
− | |||
Line 14: | Line 10: | ||
* Read our important instructions on [[how to use SCHED.org]]! | * Read our important instructions on [[how to use SCHED.org]]! | ||
* This schedule is subject to change, check back regularly. | * This schedule is subject to change, check back regularly. | ||
+ | |||
+ | '''Keynotes:''' | ||
+ | |||
+ | * Keynote: The cyber short. A market solution for product safety and corporate governance. - Justine Bone | ||
+ | * Keynote: How hackers changed the security industry and how we need to keep changing it. - Chris Wysopal | ||
+ | |||
+ | '''Talks:''' | ||
+ | |||
+ | * See no evil, hear no evil: Hacking invisibly and silently with light and sound - Matt Wixey | ||
+ | * XFLTReaT: a new dimension in tunnelling - Balazs Bucsay | ||
+ | * Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape. - Anna Shirokova, Veronica Valeros | ||
+ | * Exploiting IoT Devices over Software Defined Radio, ZigBee, WiFi and BLE - Swaroop Yermalkar | ||
+ | * Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) - Sampada Nandedkar, Rushikesh Nandedkar | ||
+ | * Weaponizing the BBC Micro:Bit - Damien Cauquil | ||
+ | * Secure channels: Building real world crypto systems - Sander Demeester | ||
+ | * MEATPISTOL, A Modular Malware Implant Framework - Josh Schwartz, John Cramb | ||
+ | * Open Source Security Orchestration - Gregory Pickett | ||
+ | * Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis - František Střasák and Sebastian Garcia | ||
+ | * Evading Microsoft ATA for Active Directory Domination - Nikhil Mittal | ||
+ | * Browser Exploits? Grab them by the collar! - Debasish Mandal | ||
+ | |||
+ | '''Workshops:''' | ||
+ | |||
+ | * Programming Wireshark With Lua - Didier Stevens | ||
+ | * Getting the Most Out of Windows Event Logs - David Szili | ||
+ | * Building a cheap, robust, scaling, penetration testing/bug bounty super computer - Steven Wierckx, Andy Deweirt | ||
+ | * Practical iOS App Exploitation and Defense using iGoat - Swaroop Yermalkar | ||
+ | * Malware Triage: Malscripts Are The New Exploit Kit - Sergei Frankoff, Sean Wilson | ||
+ | * Jedi's trick to convince your boss and colleagues - Emmanuel Nicaise | ||
+ | * May the data stay with you - Network Data Exfiltration Techniques. - Leszek Mis | ||
+ | * Hacking Bluetooth Smart locks - Slawomir Jasek | ||
+ | * Defeating Proprietary Protocols the Smart Way - Georges Bossert and Frédéric Guihéry | ||
+ | * Practical Machine Learning in InfoSecurity - Anto Joseph, Clarence Chio | ||
+ | * Playing with RFID workshop - Vinnie Vanhoecke, Tom Kustermans, Joachim Schäfers | ||
+ | * Windows malware development: A JMP in the dark - Yannick Wellens |
Revision as of 13:42, 15 June 2017
General Information
- Registrations start at 8h30!
- Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
- Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
- Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
- Read our important instructions on how to use SCHED.org!
- This schedule is subject to change, check back regularly.
Keynotes:
- Keynote: The cyber short. A market solution for product safety and corporate governance. - Justine Bone
- Keynote: How hackers changed the security industry and how we need to keep changing it. - Chris Wysopal
Talks:
- See no evil, hear no evil: Hacking invisibly and silently with light and sound - Matt Wixey
- XFLTReaT: a new dimension in tunnelling - Balazs Bucsay
- Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape. - Anna Shirokova, Veronica Valeros
- Exploiting IoT Devices over Software Defined Radio, ZigBee, WiFi and BLE - Swaroop Yermalkar
- Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) - Sampada Nandedkar, Rushikesh Nandedkar
- Weaponizing the BBC Micro:Bit - Damien Cauquil
- Secure channels: Building real world crypto systems - Sander Demeester
- MEATPISTOL, A Modular Malware Implant Framework - Josh Schwartz, John Cramb
- Open Source Security Orchestration - Gregory Pickett
- Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis - František Střasák and Sebastian Garcia
- Evading Microsoft ATA for Active Directory Domination - Nikhil Mittal
- Browser Exploits? Grab them by the collar! - Debasish Mandal
Workshops:
- Programming Wireshark With Lua - Didier Stevens
- Getting the Most Out of Windows Event Logs - David Szili
- Building a cheap, robust, scaling, penetration testing/bug bounty super computer - Steven Wierckx, Andy Deweirt
- Practical iOS App Exploitation and Defense using iGoat - Swaroop Yermalkar
- Malware Triage: Malscripts Are The New Exploit Kit - Sergei Frankoff, Sean Wilson
- Jedi's trick to convince your boss and colleagues - Emmanuel Nicaise
- May the data stay with you - Network Data Exfiltration Techniques. - Leszek Mis
- Hacking Bluetooth Smart locks - Slawomir Jasek
- Defeating Proprietary Protocols the Smart Way - Georges Bossert and Frédéric Guihéry
- Practical Machine Learning in InfoSecurity - Anto Joseph, Clarence Chio
- Playing with RFID workshop - Vinnie Vanhoecke, Tom Kustermans, Joachim Schäfers
- Windows malware development: A JMP in the dark - Yannick Wellens