44Con2018 2018 Sept. 12, 2018 to Sept. 12, 2018, London, United Kingdom

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Catch Me If You Can: Ephemeral Vulnerabilities in Bug Bounties Shubham Gianarakis The internet is changing, at a much faster pace today with cloud computing being so ...
Exploits with Scratch Kev Sheldrake Scratch is a programming language and IDE targeted at teaching young children how to code. ...
Security module for php7 - Killing bugclasses and virtual-patching the rest! Julien Koechlin Suhosin is a great PHP module, but unfortunately, it’s getting old, new ways have been ...
Kill All Humans... Bugs! : Machine Learning to the rescue of code review Philippe Arteau Security code reviews with static analysis tools have inherent problems. While many potential vulnerabilities are ...
Reverse Engineering and Bug Hunting on KMDF Drivers Enrique Elias Nissim Numerous technical articles, presentations, and even books exists about reverse engineering the Windows Driver Model ...
They're All Scorpions - Succesful SecOps in a Hostile Workplace Pete Herzog Your job is to secure operations. But nobody listens to you. There’s no budget. Management ...
The UK's Code of Practice for Security in Consumer IoT Products and Services David Rogers In March 2018, the UK launched its Secure by Design report in order to help ...
How to Explain Post-Quantum Cryptography to a Middle School Student Klaus Schmeh One of the hottest topics in current crypto research is Post-Quantum Cryptography. This branch of ...
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010 Gabriel Ryan Feedback form is now closed.Existing techniques for bypassing wired port security are limited to attacking ...
For the Love of Money: Finding and exploiting vulnerabilities in mobile point of sales systems Leighanne Yunusov These days it’s hard to find a business that doesn’t accept faster payments. Mobile Point ...
Workshop: Sys Mon! Why yu nuh logging dat? Charl van der Walt , Willem Morris Sysmon from Microsoft is a very powerful host-level tracing tool, which can assist in detecting ...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis? Charl van der Walt Cyber Security is often framed in terms of ‘Risk’- the possibility of suffering harm or ...
So You Want to Red Team? Lawrence Lorentzen So, you want to be a Red Teamer, but you can’t get into it because ...
Automating myself out of a job - A pentesters guide to left shifting security testing Jay Harris Security is big business. Between security companies trying to sell “security-in-a-box” and infosec professionals charging ...
Ghost in the Locks - owning electronic locks without leaving a trace Timo Tuominen A little over ten years ago, a friend of ours returned to his hotel room ...
Subverting Direct X Kernel For Gaining Remote System Rancho Nan Since Edge introduced the win32k filter mechanism, the way of escaping the sandbox from kernel ...
Insight into fuzzing and pwning of Adobe Flash Jie Zeng In recent years, more hacker attacks (Advanced Persistent Threat) for Adobe Flash Player have taken ...
Assumptions, the Deadliest Vulnerability Pete Herzog Once upon a time there was a little girl named Goldilocks. She went for a ...
Ancient Traditions and The Great Enterprise Paywal Nicky Bloor Modern computer systems rely on technology that wasn’t built with security in mind. Over the ...