Program |
Transcription
Program |
Program | 13 november Track 1 10.00 Registration 11.30 Opening Track 2 12.00 – 12.50 “Is infosec a game?”, Alexander ‘Solar Designer’ Peslyak 13.00 – 13.50 “Crypto coding v2”, Jean-Philippe Aumasson “Hunting for top bounties”, Nicolas Gregoire 14.00 – 14.50 “Chip reversing”, Dmitry Nedospasov “Steroids for your App Security assessment”, Marco Grassi 15.00 – 17.00 Lunch 17.00 – 17.50 “Project Heapbleed”, Patroklos Argyroudis “DTM components: shadow keys to the ICS kingdom”, Alexander Bolshev, Gleb Cherbov, Svetlana Cherkasova 18.00 – 18.50 “The past, the present and the future of software exploitation techniques”, Nikita Tarakanov “Non-cryptographic research of orthodox cryptographic media, or How we tested the security of key data storage on tokens…”, Sergey Soldatov, Mikhail Egorov Moscow, Izmailovo Concert Hall, Izmailovskoe Ave., 71, bld. 5 Workshop 1 Workshop 2 “Computer forensic investigation of {mobile} banking Trojan”, Boris Ivanov “Using radare2 framework for reversing and debugging malware and firmware”, Part 1 Anton Kochkov, Julien Voisin “iOS forensics with OpenSource tools”, Andrey Belenko “Using radare2 framework for reversing and debugging malware and firmware”, Part 2 Anton Kochkov, Julien Voisin www.zeronights.org Program | 14 november 11.00 – 11.50 12.00 – 12.50 Track 1 Track 2 Workshop 1 “How to *really* piss off the surveillance state with your privacy tool”, Jake McGinty “4x4G: from SIM to GGSN”, Alexey Osipov, Timur Yunusov, Kirill Nesterov Defensive Track (20 min) “Racing with Droids”, Peter Hlavaty 13.00 – 13.50 “EMET 5.0 – armor or curtain?”, Freingruber Renй 14.00 – 16.00 Lunch 16.00 – 16.50 “Deobfuscation and beyond”, Dmitry Schelkunov, Vasily Bukasov “DPI as a means of access segregation in a corporate network”, Igor Bulatenko “WAF in scale”, Alexey Sintsov “SMM monitoring guarding the security of Internet services”, Karim Valiev “Building a complex incoming mail analysis system based on OpenSource solutions”, Alexey Karyabkin, Pavel Kulikov “Preventing mobile malware in CSP’s network. Android honeypot for antifraud”, Denis Gorchakov, Nikolay Goncharov “De-anonymization and total espionage”, Dmitry Boomov Live discussion “Unexpected expected exception: think different about web-related vulnerabilities”, Ivan Novikov “Fuzzer of the State - Evolutionary Black-Box Fuzzing”, Fabien DUCHENE FastTrack (15 min) 17.00 – 17.50 “Hardware assisted virtualization in AV software”, Peter Kamensky “Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2”, Rahul Sasi 18.00 – 18.50 “Your Q is my Q”, Georgi Geshev “Miniturization (Fitting a full process control attack into a small microcontroller)”, Jason Larsen 19.00 – 19.30 Closing Moscow, Izmailovo Concert Hall, Izmailovskoe Ave., 71, bld. 5 Workshop 2 “Unsafe factory settings and firmwares”, Victor Alyushin “Parkomagic: substandard look on parking terminals”, Denis Makrushin, Stas Merzlyakov “Hidden timing channels based on HTTP caching headers”, Denis Kolegov, Oleg Broslavsky, Nikita Oleksov “A pentester’s view of Oracle Database Communication Protocol, or Rude Oracle experiments”, Roman Bazhin “Fast (and almost automatic) SSRF detection”, Eldar ‘kyprizel’ Zaitov “+22: reversing 64-bit binaries using Hex-Rays x86 Decompiler”, Vlad ‘vos’ Roskov “Bypassing kernel patch guard on Windows 8.1 and Windows 10”, Artem Shishkin, Mark Ermolov “Go in a virmaker production”, Boris Ryutin “Kernel AddressSanitizer: searching for vulnerabilities in Linux kernel”, Dmitry Vyukov “Roaming tiger”, Anton Cherepanov “Deriving cryptographic keys via power consumption”, Part 1 Roman Korkikyan “Deriving cryptographic keys via power consumption”, Part 2 Roman Korkikyan www.zeronights.org