Day 2 Talks for #HITB2018AMS Announced
The agenda for Day 2 of the 9th annual HITB Security Conference in The Netherlands (#HITB2018AMS) has been announced with even more advanced research including new sandbox evasion techniques, a ground breaking method for establishing covert channels over GSM mobile networks, a tool for backdooring cars and much more. Here's what's in store:
- Reference This: Sandbox Evasion Using VBA Referencing
- Mallet: Towards a Generic Intercepting Proxy
- Mind the Gap: Uncovering the Android Patch Gap Through Binary-Only Patch Level Analysis
- Over The Edge: Pwning The Windows Kernel
- In Through The Out Door: Backdooring Cars With The Bicho
- From Quantitative Change to Qualitative Change – A New Fuzzing Method for Android
- Call Me Maybe: Establishing Covert Channels By Abusing GSM AT Commands
- Seems Exploitable: Exposing Hidden Exploitable Behaviors Using Extended Differential Fuzzing
- Suborigins: A Journey Through the Land of CSP and What’s Next
- Look Ma, No Win32_Process Needed: Expanding Your WMI Lateral Movement Arsenal
Hands On Labs (120 minutes)
- Friends, Romans, Countrymen – Lend Me Your kernel_task Port
- Predicting Malicious Domains Through Requester Country Popularity Using Convolutional Neural Networks
Talks for the CommSec track will be announced next! Still haven't booked your seats? You might want to get cracking as spaces are filling up fast: https://conference.hitb.org/hitbsecconf2018ams/register/