SyScan 360 2016

TimeSpeaker/Topic/PDF Download
09:00 - 09:20
Xiangdong Qi / Thomas / Welcoming remarks 
09:20 - 10:20
Mathew Solnik / Demystifying the Secure Enclave Processor  PDF
10:20 - 11:10
Yuki Chen, MJ0011 / Escape Plans: A Year’s Journey with Microsoft Edge Security Mitigations 
11:10 - 11:25Coffee Break (Preliminary Contest of Badge)
11:25 - 12:25
Li Kang / The Hype and Reality of AI in Vulnerability Discovery  PDF
12:25 - 14:00Lunch (Preliminary Contest of Badge)
14:00 - 14:40
Ashley Zhao / Application of Machine Learning in Threat Intelligence Data Mining  PDF
14:40 - 15:40
15:40 - 15:55Coffee Break (Preliminary Contest of Badge)
15:55 - 16:25
Jianhao Liu, Minrui Yan / A platform base on visualization for protecting CAN bus security  PDF
16:25 - 16:55
16:55 - 17:55
Saruhan Karademir / Windows Server Container - The New Panacea?  PDF

25.11.2016

TimeSpeaker/Topic/PDF Download
09:00 - 09:50
Jayson E. Street / Strategies on Securing you banks & enterprises. (From someone who robs banks & enterprises)  PDF
09:50 - 10:50
Adam Laurie / Old Skewl Hacking: DVB-T Black Button Pivot  PDF
10:50 - 11:05Coffee Break
11:05 - 11:55
Team Pangu / Analysis of iOS 9.3.3 Jailbreak & Security Enhancements of iOS 10  PDF
11:55 - 12:25
Francisco Alonso, Jaime Penalba / Browser Bug Hunting and Mobile  PDF
12:25 - 13:50Lunch (Time-limited Badge Cracking)
13:50 - 14:40
Moritz Jodeit / Look Mom! I Don’t Use Shellcode: A Browser Exploitation Case Study for Internet Explorer 11  PDF
14:40 - 15:40
Edgar Barbosa / Running Code in the TrustZone Land  PDF
15:40 - 15:55Coffee Break
15:55 - 16:55
Deng Yuan, Gong Guang / BadKernel —--- exploit V8 with a typo  PDF
16:55 - 17:25
Joxean Koret / “Cosa Nostra” an open-source malware clusterization toolkit  PDF
TimeSpeaker/Topic/PDF Download
08:00 - 09:00Registration and Breakfast
09:00 - 09:15
Thomas Lim / Opening and Welcome Address 
09:15 - 10:15
Georg Wicherski / Towards a Secure and Measured Travel Laptop  PDF
10:45 - 11:30
11:30 - 11:45Break
11:45 - 12:30
Robert Miller / LoRa the Explorer - Attacking and Defending LoRa systems  PDF
12:30 - 14:00Lunch
14:00 - 14:45
Paul Rascagneres / Windows systems & code signing protection  PDF
14:45 - 15:00Bar Break
15:00 - 15:45
David Jorm / Remote code execution via Java native deserialization   PDF
15:45 - 16:15Bar Break
16:15 - 17:15
Stefan Esser / OS X El Capitan - Sinking the S/h\IP  PDF
18:00 - 21:00Networking Party

24.03.2016

TimeSpeaker/Topic/PDF Download
08:00 - 09:30Breakfast
09:20 - 10:15
Tang Qing Hao / Virtualization System Vulnerability Discovery Technology  PDF
10:15 - 11:00
Felix Wilhelm / Xenpwn: Breaking Paravirtualized Devices  PDF
11:00 - 11:30Break
11:30 - 12:15
Sebastian Apelt / Pwning Adobe Reader - Abusing the reader’s embedded XFA engine for reliable Exploitation  PDF
12:15 - 13:00
Shan Haoqi / Attack and defense toolkits in High/Low frequency  PDF
13:00 - 14:00Lunch
14:00 - 14:30
Ivan Novikov / Key-value injections here!  PDF
14:30 - 15:00Bar Break
15:00 - 16:00
Pedro Vilaça / Memory Corruption is for Wussies! 
16:00 - 16:30Bar Break
16:30 - 17:00WhiskyCon
17:00 - 17:30Closing Ceremony