Skip to content
hiddenillusion edited this page Nov 30, 2017 · 3 revisions
Slot Track 1 (L.63) Track 2 (L.76) Track 3 (L.61)
08:00 - 08:50 Registration/Coffee - -
08:50 - 09:00 Opening Remarks
Dr. Lovely's Intro on D4CS
- -
09:00 - 09:30 Keynote - -
09:30 - 10:00 Visionary Keynote - -
10:00 - 10:45 Docker Containers for Malware Analysis The Ransomware Threat:
Tracking the Digital Footprints
Entrepreneur Hour
10:45 - 11:00 break break break
11:00 - 11:45 Defense at Scale How Hackers View Your Web Site Electronics Workshop,
LP Village,
CTF,
Embedded Exploitation Village (Ongoing)
11:45 - 13:00 lunch lunch lunch
13:00 - 13:45 Mobile implants in the age of cyber-espionage Beyond IDS: Practical Network Hunting Electronics Workshop,
LP Village,
CTF,
Embedded Exploitation Village (Ongoing)
14:00 - 14:45 99 Problems but a Microkernel ain't one! The Insecurity Of Things Electronics Workshop,
LP Village,
CTF,
Embedded Exploitation Village (Ongoing)
15:00 - 15:45 Change is the only constant:
A day in the life of DNS changes
Making & Breaking Machine Learning Anomaly Detectors in Real Life Electronics Workshop,
LP Village,
CTF,
Embedded Exploitation Village (Ongoing)
15:45 - 16:00 break break break
16:00 - 16:45 No Silver Bullet. Multi contextual threat detection via Machine Learning The Pagentry of Lateral Movement Electronics Workshop,
LP Village,
CTF,
Embedded Exploitation Village (Ongoing)
17:00 - 17:45 An Adversarial View of SaaS Malware Sandboxes Warranty Void If Label Removed - Attacking MPLS Networks Electronics Workshop,
LP Village,
CTF,
Embedded Exploitation Village (Ongoing)
17:45 - 18:00 Closing remarks - -
18:00 - ? After party @ Red Balloon Security Office
Clone this wiki locally
You can’t perform that action at this time.