09:00
-
09:50 | TBC | CLOSED |
---|
10:00 - 10:30 | COFFEE |
---|
10:30 - 11:20 | The tale of Rhadamanthys and the 40 thieves - the nuts, bolts, and lineage of a multimodular stealerby Hasherezade & Ben Herzog | From keyless to careless: Abusing misconfigured OIDC authentication in cloud environmentsby Christophe Tafani-Dereeper | CLOSED |
---|
11:30 - 12:20 | When Malware Becomes Creative: A Survey of Advanced Android Detection Evasion Tacticsby Dimitrios Valsamaras | Microsoft 365's BEC - Detection Engineering Challenges and Opportunitiesby Eliraz Levi | CLOSED |
---|
12:30 - 13:30 | LUNCH |
---|
13:30 - 14:20 | ADDS Persistance - Burn it, burn it allby Shutdown (Charlie BROMBERG) & Volker | What Can We Do About Cryptocurrency Scams?by Keven Hendricks | TBA |
---|
14:30 - 15:20 | The Accessibility Abyss: Navigating Android Malware Watersby Axelle Apvrille | Patch Different on *OSby John McIntosh | Beating the Sanitizer: Why you should add mXSS to your Toolboxby Paul Gerste & Yaniv Nizry |
---|
15:30 - 16:00 | COFFEE |
---|
16:00 - 16:50 | Secret web hacking knowledge - CTF authors hate these simple tricksby Philippe Dourassov | Current Affairs: IoT Security 101by Iana Peix | Choose your own adventure - Red team editionby Nicolas Heiniger |
---|
17:00 - 17:50 | An Uninvited House Guest: How PROXYLIB Overstayed its Welcome on Android Devicesby Lindsay Kaye | Living off the Land and Attacking Operational Technology with Surgical Precisionby Ric Derbyshire | mFT: Malicious Fungible Tokensby Mauro Eldritch |