applied security conferences and training: CanSecWest | PacSec | EUSecWest |

CanSecWest 2018 Agenda Timetable

The CanSecWest 2018 agenda's time and duration are subject to change without notice.

Please see the upcoming Speakers page for talk descriptions.

Agenda

March 10-13

Security Masters Dojo, Third and Fourth Floor, 9:00 A.M. - 6:00 P.M.

Wednesday March 14th

9:00 - 11:00 Registration
11:00 - 11:15
11:15 - 12:15 Grandma's old bag, how outdated libraries spoil Android app security - Marc Schoenefeld, Oracle
12:15 - 13:15 UPnP: Unlimited Proxies and Pwnage - Waylon Grange, Symantec
13:15 - 13:45 Break
13:45 - 14:45 Post exploit goodness on a Mainframe: SPECIAL is the new root - Ayoub Elaassal, PwC France
14:45 - 15:45 TPM Genie: Attacking the Hardware Root of Trust For Less Than $50 - Jeremy Boone, NCC Group
15:45 - 16:00 Break
16:00 - 17:00 Exploring Qualcomm Baseband via ModKit - Peter Pi, XiLing Gong, and Gmxp, Tencent Security Platform Department

Thursday March 15th

08:00 - 09:00 Registration & Breakfast
09:00 - 10:00 Forget NDIS, TDI or NIC Drivers : The Shadow Network Stack Hidden In Windows 8+ - Alex Ionescu, CrowdStrike, Inc.
10:00 - 10:30 Second Breakfast
10:30 - 11:30 Shellcodes are for the 99% - Bing Sun, Stanley Zhu, and Chong Xu, McAfee and Didi Chuxing
11:30 - 12:30 Analyzing & Breaking QNX Exploit Mitigations and PRNGs - Tobias Scharnowski and Jos Wetzels, Midnight Blue Labs
12:30 - 13:30 Lunch
13:30 - 14:15 KEYNOTE: Accelerating Canadian Cyber Innovation - Scott Jones, Communications Security Establishment (CSE)
14:15 - 15:00 Demonstration - Steve Garon, Communications Security Establ ishment (CSE)
15:00 - 15:15 break
15:15 - 16:15 Detecting Reverse Engineering with Canaries - Collin Mulliner, co-author of The Android Hacker's Handbook
16:15 - 17:15 Practical JTAG:from 0 to 1 - hyperchem, Tencent's XuanwulLab
17:15 - 17:30 Break & Pwn2Own results presentation
17:30 - 18:30 Chainspotting: Building Exploit Chains with Logic Bugs - Georgi Geshev and Rob Miller, MWR InfoSecurity
19:30 - 01:00 Reception Party @ Celebrities Nightclub

Friday March 16th

08:00 - 09:00 Breakfast
09:00 - 10:00 Scalable Threat Hunting Strategies Built to Last - Dhia Mahjoub, Thomas Mathew, and Scott Sitar, Cisco Umbrella (OpenDNS)
10:00 - 10:30 Second Breakfast
10:30 - 11:30 Social Engineering at Scale - Sara-Jayne Terp, AppNexus and Professor of Data Science at Columbia University
11:30 - 12:30 Reverse Engineering x86 Processor Microcode - Benjamin Kollenda and Philipp Koppe, Ruhr-University Bochum
12:30 - 13:30 Lunch
13:30 - 14:30 Blackhat Ethereum - Ryan Stortz and Jay Little, Trail of Bits, Inc
14:30 - 15:30 Attacks and Analysis of the Samsung S8 from Mobile PWN2OWN - Guang Gong and Jianjun Dai, Qihoo 360
15:30 - 15:45 Break
15:45 - 16:45 Tunnel War: Attack Android Through Multiple Hidden Interface - Hanxiang Wen (arnow117) and Jiashui Wang (Quhe), Ant Financial Light-Year Security Lab