CanSecWest 2015, the world’s most advanced conference focusing on applied digital security, is about bringing the industry luminaries together in a relaxed environment which promotes collaboration and social networking. The conference lasts for three days and features a single track of thought provoking presentations, each prepared by an experienced professional and talented educator who is at the cutting edge of his or her field. We give preference to new and innovative material, highlighting important, emergent technologies, techniques, or best industry practices.
The conference is single track, with one hour presentations over the duration beginning at 9:00 a.m. The registration fee includes the catered meals, and there will be a vendor display and lounge/eating area, where wireless internet access will be available (as well as in the speaking theater).
Presentations at CanSecWest 2015
- Chris Evans @scarybeasts of Google’s Project Zero – Taming wild copies: from hopeless crash to working exploit
- Jan “starbug” Krissler, T-Labs/CCC – I see therefore I am…. You
- Xiaoning Li & Haifei Li, Intel – Smart COM fuzzing tool – Explore More Sandbox Bypassing Surface in COM objects
- John Loucaides & Andrew Furtak, Intel – A new class of vulnerability in SMI Handlers of BIOS/UEFI Firmware
- Yang Yu @tombkeeper, Tencent – Sexrets in LoadLibrary
- Liang Chen of KeenTeam – Attacking WebKit Applications by exploiting memory corruption bugs
- Team Pangu @PanguTeam – Userland Exploits of Pangu 8
- Rafal Wojtczuk & Corey Kallenberg – Attacks on UEFI Security
- Yves Younan, Cisco (Sourcefire/VRT) – FreeSentry: Protecting against use-after-free vulnerabilities due to dangling pointers
- Patrick Wardle @patrickwardle, Synack – DLL Hijacking’ on OS X? #@%& Yeah!
- John Williams, EY – Memminer: Real-Time Passive Volatile Memory Inspection Inside Virtual Machines
- Nitay Artenstein, Checkpoint – NDIS Packet of Death: Turning Windows’ Complexity Against Itself
- Corey Kallenberg & Xeno Kovah, LegbaCore – How many million BIOSes would you like to infect?
- Vincent Zimmer, Intel – UEFI, Open Platforms and the Defender’s Dillema
- Fabio Assolini and Juan Andres Guerrero-Saade – Wolf in Sheep’s Clothing: Your Next APT is Already Whitelisted
- Christopher Glyer and Devon Kerr, Mandiant – There’s Something About WMI
- Matthew Weeks, root9b – Credential Assessment: Mapping Privilege Escalation at Scale
- Andy Davis, NCC Group – From baseband to bitstream and back again: What security researchers really want to do with SDR
- Kirill Nesterov and Timur Yunusov – Bootkit via SMS: 4G access level security assessment
Also please check the CanSecWest 2015 Dojo page we have added more new Dojos this year than in any other previous year. New courses on USB Armory/ARM TrustZone, Auditing Web Apps, Software Defined Radio, BIOS&SMM Attack&Defense, as well as all the other usual outstanding advanced training from some of the world’s sharpest folks. Upgrade your technology with education.