Day 1
08:00 - 09:00
Registration, coffee and snacks
09:00 - 09:30
Welcome Address
09:30 - 10:30
Password Cracking: Past, Present, Future: Keynote by Solar Designer
10:30 - 11:30
Practical Exploitation of Registry Vulnerabilities in the Windows Kernel by Mateusz Jurczyk
11:30 - 11:45
Coffee Break
11:45 - 12:15
Escaping the Safari Sandbox: A Tour of Webkit IPC by Quentin Meffre
12:15 - 12:45
The Mines of Kakadûm: Blindly Exploiting Load-Balanced Services by Simon Scannell and Anthony Weems
12:45 - 13:15
ACE up the Sleeve: Hacking into Apple’s New USB-C Controller by Thomas Roth (Stacksmashing)
14:15 - 15:15
UEFI and the Task of the Translator: Using Cross-Architecture UEFI Quines as a Framework for UEFI Exploit Development by Nika Korchok Wakulich
15:15 - 16:15
How to Fuzz Your Way to Android Universal Root: Attacking Android Binder by Eugene Rodionov, Zi Fan Tan and Gulshan Singh
16:15 - 16:30
Coffee Break
16:30 - 17:30
Iconv, Set the Charset to RCE: Exploiting the Glibc to Hack the PHP Engine by Charles Fol
17:30 - 18:30
Attacking the Samsung Galaxy A * Boot Chain by Maxime Rossi Bellom, Damiano Melotti, Raphael Neveu and Gabrielle Viala
18:30 - 18:45
Coffee Break
18:45 - 19:15
Blasting Past Webp by Ian Beer
19:45
Opening Party/Dinner - Sponsored by Binary Gecko - Please note that buses leave 19:45 from the lobby.
Day 2
10:00 - 11:00
From Phantom to Inception: Leaking Data Using Branch-Free Predictor Training by Daniël Trujillo and Johannes Wikner
11:00 - 12:00
One SMS to Root Them All: Exposing Critical Threats in Millions of Connected Devices by Alexander Kozlov and Sergey Anufrienko
12:00 - 12:15
Coffee Break
12:15 - 13:15
Beyond Android MTE: Navigating OEM's Logic Labyrinths by Joffrey Guilbon, Max, Mateusz Fruba and Georgi Geshev
14:15 - 14:45
Defense Through Offense: Microcontroller Security in Meta’s First Generation of Smart Glasses by Magal Baz and Octavian Guzu
14:45 - 15:15
Half Measures and Full Compromise: Exploiting Microsoft Exchange PowerShell Remoting by Piotr Bazyd?o
15:15 - 15:45
Almost Escaping the Sandbox: Attacking Windows Device Drivers by Erik Egsgard
15:45 - 16:00
Coffee Break
16:00 - 16:30
0-Click RCE on the Tesla Infotainment Through Cellular Network by David Berard and Vincent Dehors
16:30 - 17:30
Open Sesame: Stack Smashing Your Way into Opening Doors by Lucas Georges
17:30 - 17:45
Coffee Break
17:45 - 18:45
Booting with Caution: Dissecting Secure Boot’s Third-Party Attack Surface by Bill Demirkapi
18:45 - 19:15
The V8 Heap Sandbox by Samuel Groß
19:15 - 19:30
Closing Remarks
19:30 - 20:30
Dinner at the Hilton
20:30
Closing party at the BellBoy - Sponsored by Trenchant