Created
May 9, 2024 06:20
-
-
Save dmaynor/e67f0bfd588da6f4ea2dc08a921aee02 to your computer and use it in GitHub Desktop.
Abstract + schedule
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
The conference agenda provides additional context that can influence the ranking of talks based on their placement and | |
scheduling. Here’s a revised ranking considering the agenda: | |
1. **Solar Designer: Keynote - Password Cracking: Past, Present, Future** | |
- Positioned as the keynote, this sets the stage for the conference and draws significant attention. | |
2. **David Berard and Vincent Dehors: 0-Click RCE on the Tesla Infotainment Through Cellular Network** | |
- Scheduled towards the end of Day 2, this talk stands out as a high-impact, practical demonstration of automotive vulnerabilities. | |
3. **Ian Beer: Blasting Past WebP** | |
- Placed towards the end of Day 1, this talk about zero-click exploitation in WebP will likely attract significant interest due to its timing and relevance. | |
4. **Quentin Meffre: Escaping the Safari Sandbox: A Tour of Webkit IPC** | |
- An early slot on Day 1 ensures high visibility, making it a must-attend for those interested in web browser security. | |
5. **Joffrey Guilbon, Max, Mateusz Fruba, and Georgi Geshev: Beyond Android MTE: Navigating OEM's Logic Labyrinths** | |
- Positioned in a prime slot before lunch on Day 2, focusing on Android vulnerabilities which are highly relevant. | |
6. **Charles Fol: Iconv, Set the Charset to RCE: Exploiting the Glibc to Hack the PHP Engine** | |
- A key presentation on Day 1, post-lunch, focusing on a long-standing vulnerability with broad implications. | |
7. **Thomas Roth (Stacksmashing): ACE up the Sleeve: Hacking into Apple’s New USB-C Controller** | |
- Scheduled late morning on Day 1, this talk's mix of hardware and firmware hacking promises to be intriguing. | |
8. **Eugene Rodionov, Zi Fan Tan, and Gulshan Singh: How to Fuzz Your Way to Android Universal Root: Attacking Android Binder** | |
- Day 1 afternoon slot ensures high engagement, emphasizing practical fuzzing techniques. | |
9. **Simon Scannell and Anthony Weems: The Mines of Kakadûm: Blindly Exploiting Load-Balanced Services** | |
- Mid-morning on Day 1, this talk on exploiting load-balanced services is both relevant and positioned well. | |
10. **Magal Baz and Octavian Guzu: Defense Through Offense: Microcontroller Security in Meta’s First Generation of Smart Glasses** | |
- A post-lunch session on Day 2, offering insights into emerging tech, smart glasses. | |
11. **Nika Korchok Wakulich: UEFI and the Task of the Translator: Using Cross-Architecture UEFI Quines as a Framework for UEFI Exploit Development** | |
- Positioned early afternoon on Day 1, drawing interest from those focused on low-level exploitation techniques. | |
12. **Mateusz Jurczyk: Practical Exploitation of Registry Vulnerabilities in the Windows Kernel** | |
- An early slot on Day 1 right after the keynote, ensuring high attendance and interest. | |
13. **Alexander Kozlov and Sergey Anufrienko: One SMS to Root Them All: Exposing Critical Threats in Millions of Connected Devices** | |
- An important session on Day 2, focusing on IoT and cellular vulnerabilities. | |
14. **Piotr Bazydlo: Half Measures and Full Compromise: Exploiting Microsoft Exchange PowerShell Remoting** | |
- Early afternoon on Day 2, appealing to enterprise security professionals. | |
15. **Erik Egsgaard: Almost Escaping the Sandbox: Attacking Windows Device Drivers** | |
- Mid-afternoon on Day 2, providing practical insights into Windows security. | |
16. **Lucas Georges: Open Sesame: Stack Smashing Your Way into Opening Doors** | |
- Late afternoon on Day 2, focusing on physical security vulnerabilities. | |
17. **Bill Demirkapi: Booting with Caution: Dissecting Secure Boot’s Third-Party Attack Surface** | |
- Late afternoon on Day 2, crucial for those interested in boot-time security. | |
18. **Maxime Rossi Bellom, Damiano Melotti, Raphael Neveu, and Gabrielle Viala: Attacking the Samsung Galaxy A * Boot Chain** | |
- Late afternoon on Day 1, focusing on Android boot chain vulnerabilities. | |
19. **Samuel Groß: The V8 Heap Sandbox** | |
- Positioned at the end of Day 2, providing insights into browser security from an attacker’s perspective. | |
20. **Daniël Trujillo and Johannes Wikner: From Phantom to Inception: Leaking Data Using Branch-Free Predictor Training** | |
- Early morning on Day 2, very technical and specific, appealing to a niche audience. | |
The agenda’s scheduling can significantly influence the perceived interest and importance of each talk, with prime slots often indicating higher anticipated attendance and impact. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment