- Webinar |
- Netherlands 2024 |
- USA 2024 |
- Netherlands 2023 |
- USA 2023 |
- Netherlands 2022 |
- USA 2022 |
- Netherlands 2021 |
- USA 2021 |
- Germany 2021 |
- Berlin 2021 |
- Netherlands 2020 |
- Virtual Con 2020 |
- Berlin 2020 |
- Netherlands 2019 |
- USA 2019 |
- Berlin 2019 |
- Netherlands 2018 |
- Berlin 2018 |
- Netherlands 2017 |
- Netherlands 2016 |
- Netherlands 2015
Start | End | Integrated Circuit Reverse Engineering 101 by Olivier Thomas |
Applied physical attacks on x86 systems by Joseph FitzPatrick |
Low level hardware reversing by Javier-Vazquez Vidal, Ferdinand |
Car Hacking - Hands On, by Robert Leale |
Tiny Embedded System Firmware Reverse Engineering and Exploitation, by Alexander Bolshev |
Venue |
---|---|---|---|---|---|---|---|
8:15 | 9:00 | Registration | Registration | Registration | Registration | Registration | NH DEN HAAG Prinses Margrietplantsoen 100 2595 BR Den Haag The Netherlands |
9:00 | 10:45 | Training | Training | Training | Training | Training | |
10:45 | 11:15 | Coffee Break | |||||
11:15 | 13:00 | Training | Training | Training | Training | Training | |
13:00 | 14:00 | Lunch Break | |||||
14:00 | 15:45 | Training | Training | Training | Training | Training | |
15:45 | 16:15 | Coffee Break | |||||
16:15 | 18:00 | Training | Training | Training | Training | Training |
Start | End | Integrated Circuit Reverse Engineering 101 by Olivier Thomas |
Applied physical attacks on x86 systems by Joseph FitzPatrick |
Low level hardware reversing by Javier-Vazquez Vidal, Ferdinand |
Car Hacking - Hands On, by Robert Leale |
Tiny Embedded System Firmware Reverse Engineering and Exploitation, by Alexander Bolshev |
Venue |
---|---|---|---|---|---|---|---|
9:00 | 10:45 | Training | Training | Training | Training | Training | NH DEN HAAG Prinses Margrietplantsoen 100 2595 BR Den Haag The Netherlands |
10:45 | 11:15 | Coffee Break | |||||
11:15 | 13:00 | Training | Training | Training | Training | Training | |
13:00 | 14:00 | Lunch Break | |||||
14:00 | 15:45 | Training | Training | Training | Training | Training | |
15:45 | 16:15 | Coffee Break | |||||
16:15 | 18:00 | Training | Training | Training | Training | Training |
Start | End | Amsterdam 2-4 (Talks) |
Amsterdam 1 (Workshops) |
Exhibition Area | |
---|---|---|---|---|---|
8:00 | 9:00 | Registration | |||
9:00 | 10:00 | KEYNOTE:- Challenging real-world targets: from iPhone to insulin pump by Dr. Sergei Skorobogatov | |||
10:00 | 11:00 | A Ghost in your Transmitter: analyzing polyglot signals for physical layer covert channels detection by Jose Lopes | |||
11:00 | 11:15 | Coffee Break | |||
11:15 | 12:15 | Latest Metasploit Hardware Bridge Techniques by Craig Smith | |||
12:15 | 13:00 | Reverse Engineering of Programmable Logic Bitstreams by Andrew Zonenberg | |||
13:00 | 14:00 | Lunch Break | |||
14:00 | 14:45 | Flip a bit, grab a key: symbolic execution edition by Jasper van Woudenberg | Xtensa Mongoose OS exploitation by Carel Van Rooyen and Philipp Promeuschel | Lockpicking Village by Walter Belgers | Car Hacking Village |
14:45 | 15:30 | To Guess Wrong is Expensive: A Deduce and Remove Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls by Sarani Bhattacharya | |||
15:30 | 16:00 | Coffee Break | |||
16:00 | 16:45 | Shaking trust in hardware: Attacks on hardware from software, Rowhammer and an MMU side channel from Javascript by Ben Gras | Using inexpensive consumer-off-the-shelf platforms for high-risk travel security by Ryan Lackey | Lockpicking Village by Walter Belgers | Car Hacking Village |
16:45 | 17:15 | CXO Panel:- Who owns your car? | |||
19:30 | 21:30 | Invite Only Cocktail Dinner Sponsored by HackerOne |
Start | End | Amsterdam 2-4 (Talks) |
Amsterdam 1 (Workshops) |
Exhibition Area | |
---|---|---|---|---|---|
10:00 | 11:00 | KEYNOTE:- Hardware Trojans and the Internet of Things by Dr. Christof Paar | |||
11:00 | 11:15 | Coffee Break | |||
11:15 | 12:15 | Hardware Root of Mistrust by Joe FitzPatrick | |||
12:15 | 13:00 | KERNELFAULT: Pwning Linux using Hardware Fault Injection by Niek Timmers and Cristofaro Mune | |||
13:00 | 14:00 | Lunch Break | |||
14:00 | 14:45 | A little review of security challenges in Silicon Photonics integrated circuits by Alexander Bolshev | Black Box Debugging of Embedded Industrial Control Systems by Alexandru Iulian Ariciu and Robin Massink | Lockpicking Village by Walter Belgers | Car Hacking Village |
14:45 | 15:30 | TEMPEST attacks against AES by Craig Ramsay | |||
15:30 | 16:00 | Coffee Break | |||
16:00 | 16:45 | The RTOS Exploit Mitigation Blues by Jos Wetzels | Automated Unpacking, Analysis and Comparision of Arbitrary Firmware Imges: The Firmware Analysis and Compare Tool (FACT) by Johannes Vom Dorp | Lockpicking Village by Walter Belgers | Car Hacking Village |
16:45 | 17:15 | CXO Panel:- (Un)Dependable Dependencies in Safety-Critical Infrastructure | |||
17:15 | 17:45 | Hack your body, one implant at a time by Patrick Paumen | |||
17:45 | 18:00 | Prize Distribution for the CTF | |||
18:00 | 19:00 | Network with Fellow Hacker |