• Tuesday, August 6
  • BEEMKA / Electron Post-Exploitation When The Land Is Dry

    Pavel Tsakalidis
    Tue, 11:30 - 12:25
    Breaking Ground
  • Unpacking pkgs: A look inside macOS Installer packages and common security flaws

    Andy Grant
    Tue, 14:00 - 14:55
    Breaking Ground
  • Using Machines to exploit Machines - harnessing AI to accelerate exploitation

    Guy Barnhart-Magen, Ezra Caltum
    Tue, 15:00 - 15:55
    Breaking Ground
  • Meltdown's Aftermath: Leveraging KVA Shadow To Bypass Security Protections

    Omri Misgav, Udi Yavo
    Tue, 17:00 - 17:55
    Breaking Ground
  • Neurosecurity: where Infosec meets Brain-machine Interface

    Matt Canham, Ben D Sawyer
    Tue, 18:00 - 18:55
    Breaking Ground
  • Wednesday, August 7
  • Loki: Add a little chaos to your USB drive

    Michael Rich
    Wed, 10:00 - 10:55
    Breaking Ground
  • From EK to DEK: An Analysis of Modern Document Exploit Kits

    Joshua Reynolds
    Wed, 11:00 - 11:55
    Breaking Ground
  • From email address to phone number

    Martin Vigo
    Wed, 12:00 - 12:25
    Breaking Ground
  • Virtual Breakpoints for x86_64

    Gregory Price
    Wed, 14:00 - 14:55
    Breaking Ground
  • ROP with a 2nd Stack, or This Exploit is a Recursive Fibonacci Sequence Generator

    Nicholas Mosier
    Wed, 15:00 - 15:55
    Breaking Ground
  • At Your Service - Abusing the Service Workers Web API

    Daniel Abeles, Shay Shavit
    Wed, 17:00 - 17:55
    Breaking Ground
  • State of DNS Rebinding - Attack & Prevention Techniques and the Singularity of Origin

    Gerald Doussot, Roger Meyer
    Wed, 18:00 - 18:55
    Breaking Ground