SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2017

Jump to: navigation, search
(General Information)
Line 1: Line 1:
 
__NOTOC__
 
__NOTOC__
{| border="1" width="100%" style="text-align:center;"
 
| The completed schedule is available on '''http://sched.brucon.org/grid-full'''
 
|-
 
|}
 
  
 
   
 
   
Line 14: Line 10:
 
* Read our important instructions on [[how to use SCHED.org]]!
 
* Read our important instructions on [[how to use SCHED.org]]!
 
* This schedule is subject to change, check back regularly.
 
* This schedule is subject to change, check back regularly.
 +
 +
'''Keynotes:'''
 +
 +
* Keynote: The cyber short. A market solution for product safety and corporate governance. - Justine Bone
 +
* Keynote: How hackers changed the security industry and how we need to keep changing it. - Chris Wysopal
 +
 +
'''Talks:'''
 +
 +
* See no evil, hear no evil: Hacking invisibly and silently with light and sound - Matt Wixey
 +
* XFLTReaT: a new dimension in tunnelling - Balazs Bucsay
 +
* Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape. - Anna Shirokova, Veronica Valeros
 +
* Exploiting IoT Devices over Software Defined Radio, ZigBee, WiFi and BLE - Swaroop Yermalkar
 +
* Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) - Sampada Nandedkar, Rushikesh Nandedkar
 +
* Weaponizing the BBC Micro:Bit - Damien Cauquil
 +
* Secure channels: Building real world crypto systems - Sander Demeester
 +
* MEATPISTOL, A Modular Malware Implant Framework - Josh Schwartz, John Cramb
 +
* Open Source Security Orchestration - Gregory Pickett
 +
* Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis - František Střasák and Sebastian Garcia
 +
* Evading Microsoft ATA for Active Directory Domination - Nikhil Mittal
 +
* Browser Exploits? Grab them by the collar! - Debasish Mandal
 +
 +
'''Workshops:'''
 +
 +
* Programming Wireshark With Lua - Didier Stevens
 +
* Getting the Most Out of Windows Event Logs - David Szili
 +
* Building a cheap, robust, scaling, penetration testing/bug bounty super computer - Steven Wierckx, Andy Deweirt
 +
* Practical iOS App Exploitation and Defense using iGoat - Swaroop Yermalkar
 +
* Malware Triage: Malscripts Are The New Exploit Kit - Sergei Frankoff, Sean Wilson
 +
* Jedi's trick to convince your boss and colleagues - Emmanuel Nicaise
 +
* May the data stay with you - Network Data Exfiltration Techniques. - Leszek Mis
 +
* Hacking Bluetooth Smart locks - Slawomir Jasek
 +
* Defeating Proprietary Protocols the Smart Way - Georges Bossert and Frédéric Guihéry
 +
* Practical Machine Learning in InfoSecurity - Anto Joseph, Clarence Chio
 +
* Playing with RFID workshop - Vinnie Vanhoecke, Tom Kustermans, Joachim Schäfers
 +
* Windows malware development: A JMP in the dark - Yannick Wellens

Revision as of 14:42, 15 June 2017


General Information

  • Registrations start at 8h30!
  • Typically workshops run for 2 consecutive speaking slots (ca. 2 hours), but some of them are even longer
  • Workshop rooms in the location Novotel Ghent (Orval, Chimay, La Trappe) are 5 minutes walking from the main venue
  • Workshop seats are limited. Reserved seats get in until 5 min before the workshop. After that it is first come, first in.
  • Read our important instructions on how to use SCHED.org!
  • This schedule is subject to change, check back regularly.

Keynotes:

  • Keynote: The cyber short. A market solution for product safety and corporate governance. - Justine Bone
  • Keynote: How hackers changed the security industry and how we need to keep changing it. - Chris Wysopal

Talks:

  • See no evil, hear no evil: Hacking invisibly and silently with light and sound - Matt Wixey
  • XFLTReaT: a new dimension in tunnelling - Balazs Bucsay
  • Knock Knock... Who's there? admin admin and get in! An overview of the CMS brute-forcing malware landscape. - Anna Shirokova, Veronica Valeros
  • Exploiting IoT Devices over Software Defined Radio, ZigBee, WiFi and BLE - Swaroop Yermalkar
  • Races, Reaches and Rescues!!! (Race condition vulnerabilities revisited) - Sampada Nandedkar, Rushikesh Nandedkar
  • Weaponizing the BBC Micro:Bit - Damien Cauquil
  • Secure channels: Building real world crypto systems - Sander Demeester
  • MEATPISTOL, A Modular Malware Implant Framework - Josh Schwartz, John Cramb
  • Open Source Security Orchestration - Gregory Pickett
  • Detecting malware even when it is encrypted - Machine Learning for network HTTPS analysis - František Střasák and Sebastian Garcia
  • Evading Microsoft ATA for Active Directory Domination - Nikhil Mittal
  • Browser Exploits? Grab them by the collar! - Debasish Mandal

Workshops:

  • Programming Wireshark With Lua - Didier Stevens
  • Getting the Most Out of Windows Event Logs - David Szili
  • Building a cheap, robust, scaling, penetration testing/bug bounty super computer - Steven Wierckx, Andy Deweirt
  • Practical iOS App Exploitation and Defense using iGoat - Swaroop Yermalkar
  • Malware Triage: Malscripts Are The New Exploit Kit - Sergei Frankoff, Sean Wilson
  • Jedi's trick to convince your boss and colleagues - Emmanuel Nicaise
  • May the data stay with you - Network Data Exfiltration Techniques. - Leszek Mis
  • Hacking Bluetooth Smart locks - Slawomir Jasek
  • Defeating Proprietary Protocols the Smart Way - Georges Bossert and Frédéric Guihéry
  • Practical Machine Learning in InfoSecurity - Anto Joseph, Clarence Chio
  • Playing with RFID workshop - Vinnie Vanhoecke, Tom Kustermans, Joachim Sch√§fers
  • Windows malware development: A JMP in the dark - Yannick Wellens