|
Brian Butterly |
Indepent Security Researcher |
Peeeeoow Klonk! - Having fun with Crane Remotes |
|
Cristofaro Mune |
Co-Founder, Raelize |
Keynote: False Injections: Tales of Physics, Misconceptions and Weird Machines |
|
Fernando Gont |
Independent Security Researcher |
Security Assessments of Internet Protocols |
|
Gerardo Richarte (gera) |
Co-Founder, Satellogic |
Keynote: 30+ years of exploiting things |
|
Ignacio Navarro |
Independent Security Researcher |
Insert coin: Hacking arcades for fun |
|
Johannes Wikner |
Researcher, ETH Zurich |
Exploiting Alternate Spectre Vulnerabilities with Alternate Predictions |
|
Kamel Ghali (KF_Lawless) |
Independent Security Researcher |
You Can't Detect Me if You Don't Know I Exist - Using OOB Techniques to Break the Rules |
|
Marion Marschalek |
Security Engineer, Large Cloud Provider |
BYOB - Bring Your Own Backdoor |
|
Nigel Ploof |
Vulnerability Researcher, L3 Harris Trenchant |
Grey Matter and Zero-Days: Outwitting Cognitive Decline in VR, or How Make Brain Do VR Good |
|
Pawel Wieczorkiewicz |
Security Researcher, Open Source Security Inc. |
What every hacker should know about TLB invalidation |
|
Eugene Rodionov and Zi Fan Tan and Gulshan Singh |
Security Researchers, Google |
How to Fuzz Your Way to Android Universal Root: Attacking Android Binder |
|
Alexandra Sandulescu and Jakob Koschel |
Security Engineer, Google |
Testing CPU Vulnerabilities mitigations in the Linux Kernel |
|
Eduardo Vela and Jordy Zomer |
Security Engineer, Google |
Modern Framework for Kernel Exploitation and Research |
|
Valentina Palmiotti (chompie) and Ruben Boonen (FuzzySec) |
Security Researcher, IBM |
The Kernel Hacker's Guide to the Galaxy: Automated Exploit Engineering |