hiddenillusion edited this page Nov 30, 2017 · 3 revisions
Slot Track 1 (L.63) Track 2 (L.76) Track 3 (L.61)
08:00 - 08:50 Registration/Coffee - -
08:50 - 09:00 Opening Remarks
Dr. Lovely's Intro on D4CS
- -
09:00 - 09:30 Keynote - -
09:30 - 10:00 Visionary Keynote - -
10:00 - 10:45 Docker Containers for Malware Analysis The Ransomware Threat:
Tracking the Digital Footprints
Entrepreneur Hour
10:45 - 11:00 break break break
11:00 - 11:45 Defense at Scale How Hackers View Your Web Site Electronics Workshop,
LP Village,
CTF,
Embedded Exploitation Village (Ongoing)
11:45 - 13:00 lunch lunch lunch
13:00 - 13:45 Mobile implants in the age of cyber-espionage Beyond IDS: Practical Network Hunting Electronics Workshop,
LP Village,
CTF,
Embedded Exploitation Village (Ongoing)
14:00 - 14:45 99 Problems but a Microkernel ain't one! The Insecurity Of Things Electronics Workshop,
LP Village,
CTF,
Embedded Exploitation Village (Ongoing)
15:00 - 15:45 Change is the only constant:
A day in the life of DNS changes
Making & Breaking Machine Learning Anomaly Detectors in Real Life Electronics Workshop,
LP Village,
CTF,
Embedded Exploitation Village (Ongoing)
15:45 - 16:00 break break break
16:00 - 16:45 No Silver Bullet. Multi contextual threat detection via Machine Learning The Pagentry of Lateral Movement Electronics Workshop,
LP Village,
CTF,
Embedded Exploitation Village (Ongoing)
17:00 - 17:45 An Adversarial View of SaaS Malware Sandboxes Warranty Void If Label Removed - Attacking MPLS Networks Electronics Workshop,
LP Village,
CTF,
Embedded Exploitation Village (Ongoing)
17:45 - 18:00 Closing remarks - -
18:00 - ? After party @ Red Balloon Security Office
Clone this wiki locally
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.
Press h to open a hovercard with more details.