Speakers & Talks
2 days of conference | 17 Talks

Spyware for rent & the world of offensive cyber (Keynote)
Fred Raynal

If you don't care about a vulnerability, why should I? (Keynote)
James Forshaw


Patch Diffing, You Are My Sword! A Deep Dive into Two Critical N-day Vulnerabilities in FortiGate
Qian Chen & Zibo Li

Exploitation Against the Clock: Xiaomi S3 Smartwatch
Sergei Volokitin

Bug Bounty: my cottage industry of crime
Jim Rush

Speed up your reverse engineering with the hrtng plugin
Georgy Kucherin


COM-pletely Unplanned: A Windows Bug Hunter's Journey to LPE
Dongjun Kim, Jongseong Kim



When ASUS IoT Devices Play Hide-and-Seek with Security: A Vulnerability Adventure
swing, chumen77, fxc233

S.H.I.E.L.D: Scudo Heap Implementation Exploits, Leaks, and Defenses
Tom Mansion

A Journey into Windows Security Support Provider Interface
Yuki Chen (@guhe120)



Security Cracks at the Summit: Rethinking OTA Updates
EunGyo Seo, HEA EUN MOON & Hyunseok Yun



JAAS is All You Need: Reviving JDBC Again and Again
Zhou Ji'an, Zhu Ying, Lzy

The Matrix Unloaded: Escaping the JTAG Reality
Thomas Sermpinis

Breaking Decompilers
Jordan Wiens

Simple is Best: The journey of taking over mobile system using a GPU logical bug
Shang Hongze


Don't Believe The Hype(rvisor)
Daniel Komaromy & Laszlo Szapula

Five years of hacking ICS/IoT in Pwn2Own
Sharon Brizinov