Day 1 - Friday 4th of February
07:00 - 09:30
Covid Antigen Testing, Registration and Coffee
09:30 - 09:45
Opening Remarks and Welcome Address by Miguel Yusim
09:45 - 10:45
Keynote by Mark Dowd
10:45 - 11:00
Coffee Break
11:00 - 12:00
These Are My Principals, If You Don't like Them, I Have Others by James Forshaw
12:00 - 13:00
Attacking Javascript Engines in 2022 by Samuel Gross and Amanda Burnett
14:00 - 15:00
Bug Hunting S21's 10ADAB1E FW by Martijn Bogaard and Federico Menarini
15:00 - 16:00
Rage Against the Machine Clear by Hany Ragab and Enrico Barberis
16:00 - 16:15
Coffee Break
16:15 - 17:15
UEFI Firmware Vulnerabilities: Past, Present and Future by Alex Ermolov, Alex Matrosov and Yegor Vasilenko
17:15 - 18:15
BlackSwan - Exploiting a Gaggle of Windows Privilege Escalation Bugs by Erik Egsgard
18:15 - 18:30
Coffee Break
18:30 - 19:00
Counter-Strike: Global Offsets - A Journey into Exploiting the Source Engine by Simon Scannell
19:00 - 20:30
Beer Stations
20:30
Dinner / Opening Party
Day 2 - Saturday 5th of February
08:00 - 10:00
Covid Antigen Testing and Coffee
10:00 - 10:30
Keynote by Shane Huntley
10:30 - 11:30
Building a DIY Baseband Debugger from Scratch by Eneko Cruz Elejalde
11:30 - 11:45
Coffee Break
11:45 - 12:45
Chip Red Pill: How we Achieved the Arbitrary [micro]Code Execution inside Intel Atom CPUs by Maxim Goryachy, Dmitry Sklyarov, and Mark Ermolov
13:45 - 14:45
Real World 0-days: A Year-in-Review of 0-day Exploits Used In-the-Wild in 2021 by Maddie Stone
14:45 - 15:45
Pwn2Own'ing your Router over the Internet by Radek Domanski and Pedro Ribeiro
15:45 - 16:00
Coffee Break
16:00 - 17:00
Case Studies of Fuzzing with Xen by Tamas K Lengyel and Bálint Varga-Perke
17:00 - 18:00
Beaconfuzz - A Journey into Ethereum 2.0 Blockchain Fuzzing and Vulnerability Discovery by Patrick Ventuzelo
18:00 - 18:15
Coffee Break
18:15 - 19:15
Data Only Sandbox Escapes by Mark Brand and Sergei Glazunov
19:15 - 19:30
Closing Remarks
19:30 - 20:30
Beer Stations / Dinner
20:30
Dinner / Closing Party