|
BlueHat
About
Schedule
Speakers
Abstracts
Activities
Travel
SCHEDULE
DAY 1 - WED / MAR 2
DAY 2 - THU / MAR 3
15:00-16:15
Registration, Gathering & Refreshments
16:15-16:25
Opening
16:25-17:20
Keynote
Rob Lefferts, Microsoft
17:20-18:00
A Brief History of iMessage Exploitation
Samuel Groß
&
Ian Beer
18:00-18:15
Break
18:15-18:55
Web3 Security: The Blockchain is Your SIEM
Tal Be'ery
&
Shalev Keren
18:55-19:35
Relaying to Greatness: Windows Privilege Escalation by abusing the RPC/DCOM protocols
Antonio Cocomazzi
&
Andrea Pierini
19:35-19:50
Break
19:50-20:30
Breaking Formation: From an Error Message to Internal AWS Infrastructure
Tzah Pahima
20:30-21:10
Security Analysis of MTE Through Examples
Saar Amar
21:10-21:25
Break
21:25-22:05
Focusing on the Fjords: Deep Dive into Chinese Pwnage of Israel
Stav Shulman
&
Yuri Rozhansky
22:05-23:00
Keynote
Andrew Morris, Grey Noise
23:00-24:00
Happy Hour
15:00-16:15
Registration, Gathering & Refreshments
16:15-16:25
Opening
16:25-17:20
Keynote
Bethany Allen-Ebrahimian, Axios
17:20-18:00
A primer on cross-chain bridges and how to break one
Niv Yehezkel
18:00-18:15
Break
18:15-18:55
Pwn'ing Cloud-Based Intercoms at Scale
Sharon Brizinov
18:55-19:35
Learning macOS security by finding vulns
Jonathan Bar Or (JBO)
19:35-19:50
Break
19:50-20:30
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild
Adam Morrison
20:30-21:10
Hyntrospect: a fuzzer for Hyper-V devices
Diane Dubois
21:10-21:25
Break
21:25-22:05
Smash The Ref - a design flaw in Windows Kernel
Gil Dabah
22:05-23:00
Keynote
Brad Spengler, Open Source Security
23:00-24:00
Happy Hour