-
Welcome Address
- H.E. Yousuf Hamad Al Shaibani
-
Crouching Tiger, Sudden Keynote
- Katie Moussouris
-
Welcome Comments
- Andrea Zapparoli Manzoni
-
Welcome Address
- Karim Sabbagh
-
Hacking The 0Day Market
- Andrea Zapparoli Manzoni
-
Rooting Routers Using Symbolic Execution
- Mathy Vanhoef
-
Somebody Answer The Phone:
Hacking Telephone Systems For Fun & Profit
- Himanshu Mehta and Sachin Wagh
-
Running Cyber Resilient Mega Events
- Eman Al Awadhi
-
Gentlehackers - Start Your AIs:
Building Your Own Self Driving, Self Racing Car
- Dhillon 'L33tdawg' Kannabhiran
-
Enhancing Deep Learning DGA Detection
Models Using Separate Character Embedding
- Vikash Yadav
-
Virtualizing IoT With
Code Coverage Guided Fuzzing
- Kai Jern Lau and Nguyen Anh Quynh
-
IPv666 - Address Of The Beast
- Marc Newlin and Chris Grayson
-
Panel Discussion: Safe Digital Transformation In Everyday Life
- Chadi Moujaes,Eman Al Awadhi,Marwan Bin Dalmook,Yousuf Al Shaiba and Rabih Daboussi
-
The Phantom Menace:
Intel ME Manufacturing Mode
- Maxim Goryachy and Mark Ermolov
-
IoT Woodpecker:
Intrusion-Detection On The Hardware Bus
- Congyuan Xu,Wang Kang and Yang Bo
-
Cyber Threats And Vulnerabilities
In The UAE For 2018 - Key Findings
- Eddie Schwartz and Alan White
-
Hacking The Human: What You Need To Know About Social Engineering
- Alan White
-
Building Security Beyond The Genesis Block
- Ryan Shepherd
-
Hunting For Backdoors In IoT Firmware
At Unprecedented Scale
- John Toterhi
-
A Multidimensional Hardware
Attack And Defense Tool Set
- Kunzhe Chai,Jie Fu and Mingchuang Qin
-
Panel Discussion: Knowledge And Capacity Building
- Fahem Al Nuaimi,Jamal N. Al-Karaki,Khalid Al-Wazani,Ronald Hale and Joni Cholwich
-
Closing Comments
- Karim Sabbagh
-
Hacking Yachts Remotely: IoT Hacking At Sea
- Stephan Gerling
-
AI Model Security:
Reverse Engineering Machine Learning Models
- Kang Li
-
Cloudy With A Chance Of Messages:
Extracting Messages From Icloud
- Vladimir Katalov
-
Hacking Into Broadband And Broadcast TV Systems
- Chaouki Kasmi,Pierre Barre and Thomas Sabono
-
Taking Over Telecom Networks
- Loay Hassan Abdelrazek and Hardik Mehta
-
Spanish Fly: Infecting Files On-The-Fly
- Leonardo Nve
-
Gold Digging: Discovering Hidden Gems In APKs
- Marc Schoenefeld
-
System-level Threats: Dangerous
Assumptions In Modern Product Security
- Cristofaro Mune
-
HitB 10th Year Anniversary Lucky Draw:
Win A Trip To Amsterdam!
- HitB Crew
-
Cyber Arms Race
- Mikko Hypponen
-
Horror On The Bus: Hacking COMBUS
- Kirils Solovjovs
-
Are You Listening?
Auditable & Provable Privacy Of Smart Speakers
- Wang Kang and Yang Bo
-
Evolution of Security Threats To
Telecommunications Infrastructures
- Emmanuel Gadaix
-
DHCP Is Hard
- Felix Wilhelm
-
Back On The Chain Gang:
Blockchain, Public Chain and Contract Security
- Li Jiafeng and Yang Changcheng
-
Offensive Memory Forensics
- Hugo Teso
-
It WISN't Me:
Attacking Industrial Wireless Mesh Networks
- Mattijs Van Ommeren and Erwin Paternotte
-
Capture This:
Real Time Packet Processing With FPGAs
- Matteo Collura
-
HWallet:
The Simple Cryptocurrency Hardware Wallet
- Nemanja Nikodijevic
-
Glitch Chronicles: Turning WebGL Into A Hammer
- Pietro Frigo
-
NTLM Relay Is Dead, Long Live NTLM Relay
- Jianing Wang and Junyu Zhou
-
A Secured And Robust Wireless Communication
System For Low-Latency Applications
- Dr. Hussameldin Mukhtar
-
Improved Blockchain Infrastructure With IoT
For Critical/Smart Government Applications
- Dr Qassim Nasir and Dr Manar Abu Talib
-
Vote Of No Confidence:
Second Factor Correctness
- Victor Mateu
-
Using Machine-Learning To Investigate
Web Campaigns At Large
- Federico Maggi
-
Hacking The International
RFQ Process #killthebuzzwords
- Dino Covotsos
-
Closing Comments
- Andrea Zapparoli Manzoni
-
Blind Digital Signatures (BDS)
- Dr. Manar Abu Talib and Dr. Qassim Nasir
-
CTF Prize Giving + Closing Ceremony + Locknote
- HitB Crew