applied security conferences and training: CanSecWest | PacSec | EUSecWest |

CanSecWest 2015 Agenda

The CanSecWest 2015 agenda is subject to change.

Agenda

March 14-17

Security Masters Dojo, Third and Fourth Floor

Wednesday March 18th

9:00 - 11:30 Registration
11:30 - 12:00 Ben Hawkes, Chris Evans Google - Project Zero: Making 0days Hard
12:00 - 13:00 Fabio Assolini and Juan Andres Guerrero-Saade, Kasperky - Wolf in Sheep's Clothing: Your Next APT is Already Whitelisted
13:00 - 13:45 Break
13:45 - 14:45 Yang Yu @tombkeeper, Tencent - Sexrets in LoadLibrary
14:45 - 15:45 Christopher Glyer and Devon Kerr, Mandiant - There's Something About WMI
15:45 - 16:00 Break
16:00 - 17:00 Nitay Artenstein, Checkpoint - NDIS Packet of Death: Turning Windows' Complexity Against Itself
17:00 - 18:00 Chris Evans @scarybeasts of Google's Project Zero - Taming wild copies: from hopeless crash to working exploit
19:00 - 22:00 Vendor Parties

Thursday March 19th

08:30 - 09:00 Registration & Breakfast
09:00 - 10:00 Jan "starbug" Krissler, T-Labs/CCC - I see therefore I am.... You
10:00 - 10:30 Second Breakfast
10:30 - 11:30 Patrick Wardle @patrickwardle, Synack - DLL Hijacking' on OS X? #@%& Yeah!
11:30 - 12:30 Team Pangu @PanguTeam - Userland Exploits of Pangu 8
12:30 - 13:30 Lunch
13:30 - 14:30 Liang Chen of KeenTeam - Attacking WebKit Applications by exploiting memory corruption bugs
14:30 - 15:30 Andy Davis, NCC Group - From baseband to bitstream and back again: What security researchers really want to do with SDR
15:30 - 15:45 Break
15:45 - 16:45 Matthew Weeks, root9b - Credential Assessment: Mapping Privilege Escalation at Scale
16:45 - 17:45 Kirill Nesterov and Timur Yunusov - Bootkit via SMS: 4G access level security assessment
19:00 - 01:00 Tronapalooza Party and Lighning Talks

Friday March 20th

08:30 - 09:00 Breakfast
09:00 - 09:50 Corey Kallenberg & Xeno Kovah, LegbaCore - How many million BIOSes would you like to infect?
09:50 - 10:40 Rafal Wojtczuk & Corey Kallenberg - Attacks on UEFI Security
10:40 - 11:10 Second Breakfast
11:10 - 12:00 John Loucaides & Andrew Furtak, Intel - A new class of vulnerability in SMI Handlers of BIOS/UEFI Firmware
12:00 - 12:50 Vincent Zimmer, Intel - UEFI, Open Platforms and the Defender's Dillema
12:50 - 13:50 Lunch
13:50 - 14:50 Yves Younan, Cisco (Sourcefire/VRT) - FreeSentry: Protecting against use-after-free vulnerabilities due to dangling pointers
14:50 - 15:50 John Williams, EY - Memminer: Real-Time Passive Volatile Memory Inspection Inside Virtual Machines
15:50 - 16:00 Break
16:00 - 17:00 Xiaoning Li & Haifei Li, Intel - Smart COM fuzzing tool - Explore More Sandbox Bypassing Surface in COM objects