With support again from NIXU, a free-to-attend HITB CommSec track with 30 and 60 minutes talks will be held during the 13th and 14th alongside the HITB2017AMS’s CommSec Exhibition Village!
This year we have also partnered with I am the Cavalry to focus 50% of the HITB CommSec track topics on issues that are becoming more and more relevant every day – the security of cars, airplanes, medical devices, critical infrastructure and home automation devices. What does this mean? If you submit a talk to the HITB CommSec track and your talk covers one of the topics above (whether offensive or defensive focused), you will have a higher chance of getting your submission accepted.
I am the Cavalry is a volunteer initiative focused around creating visibility and improving the security of exactly the above mentioned domains. Alongside the CommSec track, there will also be a meetup for I am the Cavalry during the conference where you will have the chance to meet with fellow speakers, delegates and iamthecavalry members.
13th April
10:00 – 10:40 – MORNING COFFEE BREAK
10:40 – 10:45 – Welcome Comments by NIXU
10:45 – 11:15 – Disarming EMET 5.52 – Niels Warnars
11:15 – 11:45 – A Passive Listing Ransomware Detector – Paulus Meesen & Don Mulders
11:45 – 12:15 – When Two-Factor Authentication is a Foe: Breaking Apple’s iCloud Keychain – Vladimir Katalov
12:15 – 12:45 – Fault Injection Attacks On Secure Boot – Niek Timmers & Albert Spruyt
12:45 – 14:00 – LUNCH BREAK
14:00 – 15:00 – Pwning Banks – How the Playground Evolved Over the Years – Miika Turkia
15:00 – 15:30 – Meet & Greet with the MacOS Malware Class of 2016 – Patrick Wardle
15:30 – 16:00 – Lure10: Exploiting Windows Automatic Wireless Association Algorithm – George Chatzisofroniou
16:00 – 16:30 – COFFEE BREAK
16:30 – 17:30 – So You Want To Hack Radios? – Matt Knight & Marc Newlin
17:30 – 18:00 – Low Cost Open Source Spectrum Monitoring – Dominic Spill
18:00 – END OF DAY 1
18:00 – 20:00 – HITB TCP/IP Party: iamthecavalry / OWASP (get your invites at the NIXU booth in the CommSec Village – it’s FREE)
14th April
10:00 – 10:45 – MORNING COFFEE BREAK
10:45 – 11:15 – Pwning ARM Debug Components for Sec-Related Stuff– Pascal Cotret
11:15 – 11:45 – Understanding the Microsoft Office 2016 Protected-View Sandbox – Koh Yong Chuan
11:45 – 12:15 – Intel DCI Secrets – Maxim Goryachy & Mark Ermalov
12:15 – 12:45 – UberBounty: Bug Bounty from a Program’s Perspective – Rob Fletcher
12:45 – 14:00 – LUNCH BREAK
14:00 – 14:30 – Will it blend? CISO’s and Hackers – Chris van den Hooven
14:30 – 15:00 – IoT Hacking Simplified – Aseem Jakhar
15:00 – 15:30 – A Surprise Encounter With a Telco APT – Emmanuel ‘EMX’ Gadaix
15:30 – 16:00 – Unauthorized Erlang: A Demonstration – Don Bailey
16:00 – 16:30 – How to Make a Magic Mirror – Steven Wierckx
16:30 – Closing Comments by NIXU
16:35 – END OF EVENT / COFFEE BREAK