-
Opening Note
- Antriksh Shah
-
Do We Get Stuff Done? We Don’t Get Stuff Done?
Or Do We? Or Will We, Maybe? Soon?
- Mario Heiderich
-
A Kernel Hacker Meets Fuchsia OS
- Alexander Popov
-
Hack The Bridge
- Anto Joseph
-
A UEFI Firmware Bootkt In The Wild
- Ivan Kwiatkowski
-
Secure Service Edge (SSE):
Challenges And Upsides Of Adoption
- Panel
-
ElectroVolt: Pwning Popular Desktop Apps
While Uncovering New Attack Surface On Electron
- Mohan Sri Rama Krishna Pedhapati and Maxwell Garrett
-
Hack the Source:
Securing OSS – One Bug At A Time
- Sandeep Singh
-
Impact Of Disruptive Technologies
On A CISOs Career And Progression
- Panel
-
Service Workers VS Corporate Firewalls
- Aleksandr Kolchanov
-
Consumer Tech Bug Bounty Panel:
Hear From The Program Managers
- Panel
-
Cloud Services For Financial Inclusion:
Possibilities And Challenges
- Panel
-
Scale Hacking To Secure Your Cloud And Beyond
- Anand Prakash
-
Handling A Bug Bounty Program
From A Blue Team Perspective
- Ashwath K and Ankit Anurag
-
PAM Maturity:
From Zero Trust To Least Privilege
- Panel
-
Mind The Gap:
The Linux Ecosystem Kernel Patch Gap
- Jakob Lell & Regina Bíró
-
Raining CVEs On WordPress Plugins With Semgrep
- Shreya Pohekar and Syed Sheeraz Ali
-
Unlocking Security Collaboration
With Cyber Threat Intelligence
- Panel
-
Do PDF Tools Conform To The Specification?
- Prashant Anantharaman
-
Software-Defined Snort
With Barnyard And Pulled Pork For NIDPS
- Arun Samuel Baskaran
-
Elevating The TrustZone To Achieve
A Powerful Android Kernel Exploit
- Tamir Zahavi-Brunner
-
A New Secret Stash For Fileless Malware
- Denis Legezo
-
c0ntextomy - Let's Debug Together
- Nikias Bassen
-
Web 3.0: Smart Contracts Could Be Leaky
- Riddhi Shree
-
Securing India The CERT-In Way
- Panel
-
Hacking 5G Is No Rocket Science
- Altaf Shaik and Matteo Strada
-
0-Day Up Your Sleeve:
Attacking macOS Environments
- Wojciech Reguła
-
Automate Your Whatsapp Chats
- Aditi Bhatnagar
-
Does Your SOC Suck
- Panel
-
Hacking Android Foreground
Services Escalation Of Privileges
- Rony Das
-
The Different Faces Of MacOS Malware:
Detecting Anomalies In A Poisoned Apple
- Amit Malik & Pratik Jeware
-
Securing The Software
- Panel
-
IoT Supply Chain Blues And The Way Forward
- Panel
-
Honey, I Just Put The Hospital On A Ventilator!
DICOM And Its Pitfalls
- Shyam Sundar Ramaswami and Rakesh Mahanthi
-
Jailbreaking iOS
In The Post-Apocalyptic Era
- CoolStar & Tihmstar
-
Ticketing 101: Making Sure Your
Documentation Is As Good As Your Findings
- Paula Pustulka
-
Hacking Fintech Crime:
Realities And Possibilities In India
- Anand Venkatanaryanan and Chander Mohan
-
Into The Dark:
Switching Of Renewable Power From Everywhere
- Stephan Gerling
-
Pushing Security Left
By Mutating Byte Code
- Gaurav Gogia
-
Unearthing Malicious And Other
"Risky" Open-Source Packages Using Packj
- Ashish Bijlani & Devdutt Patnaik
-
Closing And Prize Ceremony
- nullcon