SyScan 360 2016
Time | Speaker/Topic/PDF Download |
---|---|
09:00 - 09:20 | Xiangdong Qi / Thomas / Welcoming remarks |
09:20 - 10:20 | Mathew Solnik / Demystifying the Secure Enclave Processor PDF |
10:20 - 11:10 | Yuki Chen, MJ0011 / Escape Plans: A Year’s Journey with Microsoft Edge Security Mitigations |
11:10 - 11:25 | Coffee Break (Preliminary Contest of Badge) |
11:25 - 12:25 | Li Kang / The Hype and Reality of AI in Vulnerability Discovery PDF |
12:25 - 14:00 | Lunch (Preliminary Contest of Badge) |
14:00 - 14:40 | Ashley Zhao / Application of Machine Learning in Threat Intelligence Data Mining PDF |
14:40 - 15:40 | |
15:40 - 15:55 | Coffee Break (Preliminary Contest of Badge) |
15:55 - 16:25 | Jianhao Liu, Minrui Yan / A platform base on visualization for protecting CAN bus security PDF |
16:25 - 16:55 | |
16:55 - 17:55 | Saruhan Karademir / Windows Server Container - The New Panacea? PDF |
Time | Speaker/Topic/PDF Download |
---|---|
09:00 - 09:50 | Jayson E. Street / Strategies on Securing you banks & enterprises. (From someone who robs banks & enterprises) PDF |
09:50 - 10:50 | Adam Laurie / Old Skewl Hacking: DVB-T Black Button Pivot PDF |
10:50 - 11:05 | Coffee Break |
11:05 - 11:55 | Team Pangu / Analysis of iOS 9.3.3 Jailbreak & Security Enhancements of iOS 10 PDF |
11:55 - 12:25 | Francisco Alonso, Jaime Penalba / Browser Bug Hunting and Mobile PDF |
12:25 - 13:50 | Lunch (Time-limited Badge Cracking) |
13:50 - 14:40 | Moritz Jodeit / Look Mom! I Don’t Use Shellcode: A Browser Exploitation Case Study for Internet Explorer 11 PDF |
14:40 - 15:40 | Edgar Barbosa / Running Code in the TrustZone Land PDF |
15:40 - 15:55 | Coffee Break |
15:55 - 16:55 | Deng Yuan, Gong Guang / BadKernel —--- exploit V8 with a typo PDF |
16:55 - 17:25 | Joxean Koret / “Cosa Nostra” an open-source malware clusterization toolkit PDF |
Time | Speaker/Topic/PDF Download |
---|---|
08:00 - 09:00 | Registration and Breakfast |
09:00 - 09:15 | Thomas Lim / Opening and Welcome Address |
09:15 - 10:15 | Georg Wicherski / Towards a Secure and Measured Travel Laptop PDF |
10:45 - 11:30 | |
11:30 - 11:45 | Break |
11:45 - 12:30 | Robert Miller / LoRa the Explorer - Attacking and Defending LoRa systems PDF |
12:30 - 14:00 | Lunch |
14:00 - 14:45 | Paul Rascagneres / Windows systems & code signing protection PDF |
14:45 - 15:00 | Bar Break |
15:00 - 15:45 | David Jorm / Remote code execution via Java native deserialization PDF |
15:45 - 16:15 | Bar Break |
16:15 - 17:15 | Stefan Esser / OS X El Capitan - Sinking the S/h\IP PDF |
18:00 - 21:00 | Networking Party |
Time | Speaker/Topic/PDF Download |
---|---|
08:00 - 09:30 | Breakfast |
09:20 - 10:15 | Tang Qing Hao / Virtualization System Vulnerability Discovery Technology PDF |
10:15 - 11:00 | Felix Wilhelm / Xenpwn: Breaking Paravirtualized Devices PDF |
11:00 - 11:30 | Break |
11:30 - 12:15 | Sebastian Apelt / Pwning Adobe Reader - Abusing the reader’s embedded XFA engine for reliable Exploitation PDF |
12:15 - 13:00 | Shan Haoqi / Attack and defense toolkits in High/Low frequency PDF |
13:00 - 14:00 | Lunch |
14:00 - 14:30 | Ivan Novikov / Key-value injections here! PDF |
14:30 - 15:00 | Bar Break |
15:00 - 16:00 | Pedro Vilaça / Memory Corruption is for Wussies! |
16:00 - 16:30 | Bar Break |
16:30 - 17:00 | WhiskyCon |
17:00 - 17:30 | Closing Ceremony |