applied security conferences and training: CanSecWest | PacSec | EUSecWest |

History

The CanSecWest conference was established in 2000. Archives of presented material may be found below.

Material Archives - 2017, 2016
                    2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008
                    2007, 2006, 2005, 2004, 2003, 2002, 2001, 2000

CanSecWest 2016 Files

Let's Talk about WiFi - Dragos Ruiu

Exploits, 0days, and Bug Bounties - Nicolas Joly, Microsoft

BadWinmail and Email Security - Haifei Li + Chong Xu, Intel Security

WAVE YOUR FALSE FLAGS! - Deception Tactics Muddying Attribution in Targeted Attacks - Brian Bartholomew + Juan Andres Guerrero-Saade, Global Research and Analysis Team (GReAT), Kaspersky Lab

APT Reports and OPSEC Evolution: These are not the APT reports you are looking for - Gadi Evron / Sysman, Cymmetria

Bypassing application whitelisting in critical infrastructures - Rene Freingruber, SEC Consult Unternehmensberatung GmbH

Hardsploit project : All-In-One Tool for Hardware Security Audit - Julien MOINARD, Opale Security


Having fun with secure messengers and Android Wear - Artem Chaykin, Positive Technologies

Sandbox Escape with Generous Help from Security Software - Chuanda Ding, Tencent Xuanwu Lab

Getting Physical: Extreme abuse of Intel based Paging Systems - Nicolas Economou + Enrique Elias Nissim, Core Security Technologies

Execute My Packet (Exodus of Shells from a Firewall) - Alex Wheeler + Jordan Gruskonvjak, Exodus Intelligence

Attack and defense toolkits in High/Low frequency - Haoqi Shan + Qing Yang, Qihoo 360 Unicorn Team

Pwn a Nexus device with a single vulnerability - Guang Gong, Qihoo 360

Virtualization device emulator testing technology - Qinghao Tang, Qihoo 360 Marvel Team

Docker Escape Technology - Shengping Wang, Qihoo 360 Marvel Team


Bypassing Different Defense Schemes via Crash Resistant Probing of Address Space - Robert Gawlik, Ruhr University Bochum

Automatic Binary Constraint Solving: Automatic Exploit Generation - Sophia D'Antoine, Trail of Bits

Don't Trust Your Eye: Apple Graphics Is Compromised! - Liang Chen + Marco Grassi + Qidan He, Keen Labs Tencent

High Performance Zero Knowledge Binary Hooking and Tracing with ROP Hooks - with A-Trace (Eh-Trace) - Shane "K2" Macaulay, IOActive

Smart Wars: Attacking Smart Locks with a Smart Phone - Song Li, 0XiD LLC