Speakers & Talks

2 days of conference | 17 Talks

Spyware for rent & the world of offensive cyber (Keynote)

Fred Raynal

If you don't care about a vulnerability, why should I? (Keynote)

James Forshaw

Patch Diffing, You Are My Sword! A Deep Dive into Two Critical N-day Vulnerabilities in FortiGate

Qian Chen & Zibo Li

Exploitation Against the Clock: Xiaomi S3 Smartwatch

Sergei Volokitin

Bug Bounty: my cottage industry of crime

Jim Rush

Speed up your reverse engineering with the hrtng plugin

Georgy Kucherin

COM-pletely Unplanned: A Windows Bug Hunter's Journey to LPE

Dongjun Kim, Jongseong Kim

When ASUS IoT Devices Play Hide-and-Seek with Security: A Vulnerability Adventure

swing, chumen77, fxc233

S.H.I.E.L.D: Scudo Heap Implementation Exploits, Leaks, and Defenses

Tom Mansion

A Journey into Windows Security Support Provider Interface

Yuki Chen (@guhe120)

Security Cracks at the Summit: Rethinking OTA Updates

EunGyo Seo, HEA EUN MOON & Hyunseok Yun

JAAS is All You Need: Reviving JDBC Again and Again

Zhou Ji'an, Zhu Ying, Lzy

The Matrix Unloaded: Escaping the JTAG Reality

Thomas Sermpinis

Breaking Decompilers

Jordan Wiens

Simple is Best: The journey of taking over mobile system using a GPU logical bug

Shang Hongze

Don't Believe The Hype(rvisor)

Daniel Komaromy & Laszlo Szapula

Five years of hacking ICS/IoT in Pwn2Own

Sharon Brizinov