-
Opening Keynote
- H.E. Dr. Mohamed Al-Kuwaiti
-
Alt-Payments And Crypto: The Future Is Now
- Matt Johnson
-
Fireside Chat With Mouza Al Romaithi
- Mouza Al Romaithi and Saumil Shah
-
Malicious Contracts
- Kyprianos Vasilopoulos and Christian Papathansiou
-
Reversing GO Binaries With Ghidra
- Albert Zsigovits and Dorka Palotay
-
Electro-optical Sound Eavesdropping
- Ben Nassi
-
Launching A New Password Hashing Competition
- Sebastien Raveau
-
Military Bioweapons Development And Information Warfare
As A Combined Arms Capability (GCC Edition)
- William Hagestad II
-
Modern Post Exploitation: The Ghost In The Cloud
- Gal Diskin
-
5G Cyber Security Challenges And Solution
- Hulk Zhang
-
Animated Bugs: The New Remote Attack Surface In Telegram
- Paolo Giai
-
Hunting For Malicious Infrastructure Using Big Data
- Freek Bax And Shadi Alhakimi
-
Fireside Chat With Youssef Awad By H.E. Dr. Mohamed Al-Kuwaiti
- Youssef Awad and H.E. Dr. Mohamed Al-Kuwaiti
-
Harmony In Motion
- Aloysius Chang
-
Microcontroller BootROM Security-Low Level Protocol Fuzzing And Accessing Secure Memory Regions
- Sulthan Alaudeen
-
From A Workplace To A Workforce
- Ofir Arkin
-
Attack Scenarios Abusing Azure Active Directory
- Bill Ben Haim and Zur Ulianitzky
-
Challenges And Solutions For The Physical Layer-Assisted Security Framework In Flying Ad Hoc Networks
- Govind Singh,Michael Baddeley and Anshul Pandey
-
DeFi: Crypto Cyber Security Challenges
- Cesar Cerrudo
-
Fireside Chat With Cooper
- Cooper and Cherry And Saumil Shah
-
Fireside Chat With Stefano Zanero and Marco Balduzzi
- Stefano Zanero,Marco Balduzzi and Saumil Shah
-
Fireside Chat With Ofir Arkin
- Ofir Arkin and Saumil Shah
@ https://youtu.be/DRPCz5cxbmc
-
-
Gremlin Apps And Gremlin Botnets
- Chema Alonso
-
AI, ML, Deep Learning: The Value Beneath The Hype
- Michael A. Davis
-
MIPS-X: The Next IoT Frontier
- Patrick Ross and Zoltan Balazs
-
Rage Against The Machine Clear: A Systematic Analysis Of Machine Clears And Their Implications For Transient Execution Attacks
- Enrico Barberis and Hany Ragab
-
Software (Security) Analysis: Present And Future Research Initiatives
- Dr. Sanjay Rawat
-
Mystique In The House: The Droid Vulnerability
Chain That Owns All Your Applications
- Allen Huo
-
Panel Discussion: 38° C: Healthcare At A Fever Pitch
- Nina Alli,Sharka Pekarova,Jelena Milosevic and William Hagestad II
-
When Fuzzing Meets SAP Network Services : Challenges, Solutions And Profits!
- Yvan Genuer
-
Who Littered The Sandbox? Scooping Up New Malware Behavior
- Olaf Hartong
-
Hacking The Planet With Knowledge Graphs
- Hugo Teso
-
Breaking The Three Laws Of Robotics: Attacking Automated Manufacturing Systems
- Stefano Zanero
-
WIFI Security: From 0 To 1
- Sili Luo
-
HITB LAB: ARM IoT Firmware Extraction And Emulation Using ARMX
- Saumil Shah and Pauline Bourmeau
-
HITB LAB: EXPLIoT Framework
- Aseem Jakhar
-
A Trip Down History Lane On How To Defeat EDRs In Usermode
- Alessandro Magnosi and Jean Francois Maes
-
Response Smuggling: Pwning HTTP/1.1 Connections
- Martin Doyhenard
-
Deep Puzzling: Binary Code Intention
Hiding Based on AI Uninterpretability
- Jifeng Zhu and Keyun Luo
-
Knockin' On MediaTek ADSP’s Door
- Slava Makkaveev
-
A Retro- And Introspective Of The State Of Cyber
- Roger Sels
-
Fireside Chat With Barry 'Fish_' Van Kampen
- Barry 'Fish_' Van Kampen and Saumil Shah
-
Fireside Chat With Cristofaro Mune And Adam Laurie
- Cristofaro Mune,Adam Laurie and Saumil Shah
-
Fireside Chat With Nemo And Tim Murck
- Nemo,Tim Murck and Saumil Shah
-
Fireside Chat With Dhillon ‘L33tdawg’ Kannabhiran
- Dhillon ‘L33tdawg’ Kannabhiran and Cherry And Saumil Shah
-
Closing Note & ProCTF Finals: Prize Giving Ceremony
- HITB Crew