09:00
-
09:50 | Intro & Keynote (TBA) | |
---|
10:00 - 10:30 | COFFEE |
---|
10:30 - 11:20 | The Rise of AI-Driven Malware: Threats, Myths, and Defensesby Candid Wuest | The Spy Who Flashed Me: Exploring and defeating physical access control systemsby Michael Rodger | TBA | |
---|
11:30 - 12:20 | Good Models Gone Bad: Visualizing Data Poisoningby Maria Khodak | Cache Me If You Can: Smuggling Payloads via Browser Caching Systemsby Aurélien Chalot | TBA | |
---|
12:30 - 13:30 | LUNCH |
---|
13:30 - 14:20 | “A Slice of” Modern Program Analysisby Kyle Martin | The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques)by Dhiraj Mishra | TBA | |
---|
14:30 - 15:20 | Don't let Jia Tan have all the fun: hacking into Fedora and OpenSUSEby Thomas Chauchefoin & Maxime Rinaudo | Malware analysis with R2AIby Axelle Apvrille | TBA | |
---|
15:30 - 16:00 | COFFEE |
---|
16:00 - 16:50 | Your Identity is Mine: Techniques and Insights from OS Identity Providers Researchby Maor Abutbul | Data Sets That Can Make A Difference: Improving Your Hunting and Detection in Entra ID and O365by John Stoner | TBA | |
---|
17:00 - 17:50 | Go Parser Footgunsby Vasco Franco | Beyond the Surface: Exploring Attacker Persistence Strategies in Kubernetesby Rory McCune | TBA | |
---|
18:00 - 05:00 | CTF
(AUDITORIUM A) |