-
(In)Security Is Eating The World
- Michael Coates
-
A Year Of Purple
- Ryan Shepherd
-
Welcome Address
- Andrea Zapparoli Manzoni
-
KLara: Your New Friend
- Dan Demeter
-
From Assembly To Javascript And Back: Turning Memory
Errors Into Code Execution With Client-Side Compilers
- Robert Gawlik
-
Demystifying The Definitions Of
The Surface, Deep And Dark Web
- Fadli Bin Sidek
-
Brain Surgery: Breaking Full Disk Encryption
- Nicolas Collery and Vitaly Kamluk
-
God Mode Unlocked: Hardware Backdoors In X86 Cpus
- Christopher Domas
-
RedPhishing: Wi-Fi, Phishing And Red Teaming
- Matteo Beccaro
-
Generic And Static Detection Of
Mobile Malware Using Machine Learning
- Minh Tran
-
Ghost In The Locks:
Owning Electronic Locks Without Leaving A Trace
- Tomi Tuominen and Timo Hirvonen
-
Securing ICS/SCADA: Defense In Depth
- Mike Rebultan
-
The Trails Of WINDSHIFT APT
- Taha Karim
-
File Structures: Another Binary Exploitation Technique
- An-Jie Yang (Angelboy)
-
SayaKenaHack: Breach Notification In Malaysia
- Keith Rozario
-
Exploiting Automation In LTE Mobile Networks
- Ravishankar Borgaonkar and Altaf Shaik
-
Surprise Rant 2.0
- Joernchen
-
Is The Pen Mightier Than The Sword? A First Look Into The
Security Of The Apple Pencil And The Apple Smartkeyboard
- Stefan Esser
-
Zero Seconds To Midnight: The 0-day Market
- Matteo Beccaro,Cristofaro Mune,Nicolas Collery,Andrea Zapparoli Manzoni and Sam Goh
-
Lucky Draw
- Cherry
-
OK Computer:
Machine Learning In Cybersecurity
- Alexander Polyakov
-
Deep Hooks: Monitoring Native
Execution In WoW64 Applications
- Yarden Shafir and Assaf Carlsbad
-
Bicycle Day: Hacking BLE Bicycle
Locks For Fun And (A Small) Profit
- Vincent Tan
-
Data-Centric Cyber Threat Impact
Analyser For IoT And Manufacturing
- Simon Eng and Lim Eng Woei
-
Viewer Discretion Advised:
(De)Coding An iOS Vulnerability
- Adam Donenfeld
-
Cognitive Automation With
Machine Learning In Cybersecurity
- Rishi Kant
-
Internet Of Things: Battle Of The Bots
- Rommel D. Joven
-
The Road To iOS Sandbox Escape
- Rani Idan
-
Using Machine Learning To Identify
Security Issues In Open-Source Libraries
- Asankhaya Sharma
-
Learning How To Smurf With Honeypots
- Emil Tan
-
NFC Payments:
The Art Of Relay And Replay Attacks
- Salvador Mendoza
-
Software Security Era:
Past, Present, And Back To The Future
- Nafiez and Jaan Yeh
-
Blockchain And Smart Contract Attack Vectors
- Jordan Seet
-
Traversing The Kill-Chain:
The New Shiny In 2018
- Vincent Yiu
-
Hacking Mobile Games: Closing The Gap
Between "Ikan Bilis" And "Whales"
- Nicholas Lim
-
Closing Remarks
- Andrea Zapparoli Manzoni
-
Rethinking The Cyber Kill Chain
- Alexis Lavi
-
Lock Note
- Philippe Viola
-
Closing Note
- HITB Crew