Speakers & Talks
2 days of conference | 17 Talks
Spyware for rent & the world of offensive cyber (Keynote)
Fred Raynal
If you don't care about a vulnerability, why should I? (Keynote)
James Forshaw
Patch Diffing, You Are My Sword! A Deep Dive into Two Critical N-day Vulnerabilities in FortiGate
Qian Chen & Zibo Li
Exploitation Against the Clock: Xiaomi S3 Smartwatch
Sergei Volokitin
Bug Bounty: my cottage industry of crime
Jim Rush
Speed up your reverse engineering with the hrtng plugin
Georgy Kucherin
COM-pletely Unplanned: A Windows Bug Hunter's Journey to LPE
Dongjun Kim, Jongseong Kim
When ASUS IoT Devices Play Hide-and-Seek with Security: A Vulnerability Adventure
swing, chumen77, fxc233
S.H.I.E.L.D: Scudo Heap Implementation Exploits, Leaks, and Defenses
Tom Mansion
A Journey into Windows Security Support Provider Interface
Yuki Chen (@guhe120)
Security Cracks at the Summit: Rethinking OTA Updates
EunGyo Seo, HEA EUN MOON & Hyunseok Yun
JAAS is All You Need: Reviving JDBC Again and Again
Zhou Ji'an, Zhu Ying, Lzy
The Matrix Unloaded: Escaping the JTAG Reality
Thomas Sermpinis
Breaking Decompilers
Jordan Wiens
Simple is Best: The journey of taking over mobile system using a GPU logical bug
Shang Hongze
Don't Believe The Hype(rvisor)
Daniel Komaromy & Laszlo Szapula
Five years of hacking ICS/IoT in Pwn2Own
Sharon Brizinov