Conference Schedule

May 17 2018

Day 1
Conference Registration

This is the moment to pickup your badge. Make sure your have your Eventbrite ticket printed or on your mobile phone.

Intro Speeches
How to Think (About Complex Adversarial Systems)
  • Eleanor Saitta

Coffee Break
What are containers exactly and can they be trusted?
  • Stéphane Graber Canonical

Getting ahead of the elliptic curve
  • Martijn Grooten

Orange is the new Hack - Introduction to Machine Learning with Orange
  • Philippe Arteau GoSecure

Capture-The-Flag 101
  • Olivier Bilodeau GoSecure

  • Laurent Desaulniers

  • Charles Hamilton

Coffee Break
Ichthyology: Phishing as a Science
  • Karla Burnett Stripe

From Hacking Team to Hacked Team to…?
  • Filip Kafka ESET

Orange is the new Hack - Introduction to Machine Learning with Orange
  • Philippe Arteau GoSecure

Capture-The-Flag 101
  • Olivier Bilodeau GoSecure

  • Laurent Desaulniers

  • Charles Hamilton

Lunch Break
Non-Crypto Constant-Time Coding
  • Thomas Pornin NCC Group

Stupid Purple Teamer Tricks
  • Laurent Desaulniers

A Gentle Introduction to Fuzzing
  • Israël Hallé

  • Jean-Marc Leblanc EWA-Canada

Incident Response in the Age of Threat Intelligence with MISP, TheHive & Cortex
  • Saâd Kadhi CERT Banque de France

  • Raphaël Vinot Computer Incident Response Center Luxembourg

Coffee Break
Logic against sneak obfuscated malware
  • Thaís aka barbie Moreira Hamasaki

Prototype pollution attacks in NodeJS applications
  • Olivier Arteau

A Gentle Introduction to Fuzzing
  • Israël Hallé

  • Jean-Marc Leblanc EWA-Canada

Incident Response in the Age of Threat Intelligence with MISP, TheHive & Cortex
  • Saâd Kadhi CERT Banque de France

  • Raphaël Vinot Computer Incident Response Center Luxembourg

Coffee Break
Exploits in Wetware
  • Robert Sell (Creep)

Brain Implants & Mind Reading
  • Melanie Segado

A Gentle Introduction to Fuzzing
  • Israël Hallé

  • Jean-Marc Leblanc EWA-Canada

Incident Response in the Age of Threat Intelligence with MISP, TheHive & Cortex
  • Saâd Kadhi CERT Banque de France

  • Raphaël Vinot Computer Incident Response Center Luxembourg

Coffee Break
Binary analysis, meet the blockchain
  • Mark Mossberg Trail of Bits

Quick Retooling with .NET Payloads.
  • Dimitry Snezhkov IBM

A Gentle Introduction to Fuzzing
  • Israël Hallé

  • Jean-Marc Leblanc EWA-Canada

Incident Response in the Age of Threat Intelligence with MISP, TheHive & Cortex
  • Saâd Kadhi CERT Banque de France

  • Raphaël Vinot Computer Incident Response Center Luxembourg

Coffee Break
Data Breaches: Barbarians in the Throne Room
  • Dave "gattaca" Lewis Akamai Technologies

The Blackbear project
  • Marc-André Labonté

Data Breaches: Barbarians in the Throne Room
  • Dave "gattaca" Lewis Akamai Technologies

Source code vulnerability research and browser exploitation
  • Jean-Marc Leblanc EWA-Canada

Diner Break
Conference Party

This year's party will take place at two bars, located on top of eachother: ArcadeMTL & Meltdown located on St-Denis street.

May 18 2018

Day 2
Intro Speeches
Video game hacks, cheats, and glitches
  • Ron Bowes

Python and Machine Learning: How to use algorithms to create yara rules with a malware zoo for hunting
  • Sebastien Larinier (sebdraven)

Wi-Fi Security
  • Mark El-Khoury NCC Group

Hacking APIs and the MEAN Stack with OWASP DevSlop
  • Nicole Becher

  • Tanya Janca

Coffee Break
Only an Electron away from code execution
  • Silvia Väli Clarified Security OÜ

One Step Before Game Hackers -- Instrumenting Android Emulators
  • Wan Mengyuan (Nevermoe) DeNA Co., Ltd.

Wi-Fi Security
  • Mark El-Khoury NCC Group

Hacking APIs and the MEAN Stack with OWASP DevSlop
  • Nicole Becher

  • Tanya Janca

Lunch Break
Smart contract vulnerabilities: The most interesting transactions on the Ethereum blockchain
  • Sarah Friend

  • Jon Maurelian ConsenSys Diligence

Not the Droid You're Looking For: Evading Vulnerability Exploitation Through Secure Android Development
  • Kristina Balaam Shopify

Botnet Tracking and Data Analysis Using Open-Source Tools
  • Olivier Bilodeau GoSecure

  • Masarah Paquet-Clouston GoSecure

IoT Firmware Exploitation
  • Aaron Guzman

Coffee Break
Tightening the Net in Iran
  • Mahsa Alimardani Article 19

Surprise Supplies!
  • Paul Rascagnères Talos

  • Warren Mercer Talos

Botnet Tracking and Data Analysis Using Open-Source Tools
  • Olivier Bilodeau GoSecure

  • Masarah Paquet-Clouston GoSecure

IoT Firmware Exploitation
  • Aaron Guzman

Coffee Break
Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation)
  • Daniel (DBO) Bohannon FireEye

A Journey into Red Team
  • Charles Hamilton

Botnet Tracking and Data Analysis Using Open-Source Tools
  • Olivier Bilodeau GoSecure

  • Masarah Paquet-Clouston GoSecure

IoT Firmware Exploitation
  • Aaron Guzman

Coffee Break
Homeward Bound: Scanning Private IP Space with DNS Rebinding
  • Danny Cooper Akamai

  • Allan Wirth Akamai

CTF Registration
CTF

May 19 2018

Day 3
CTF
Hacker Jeopardy
CTF

May 20 2018

Day 4
CTF
Closing Ceremony