Modèle:GreHack-2013-Speakers Talks-planning : Différence entre versions

De Ensiwiki
Aller à : navigation, rechercher
(Detailled agenda/planning for GreHack 2013)
Ligne 14 : Ligne 14 :
 
attendees arrival + welcome pack + breakfast  
 
attendees arrival + welcome pack + breakfast  
 
|-
 
|-
| 9h30-10h10
+
| 9h30-10h15
| 40 min  
+
| 45 min  
| [[GreHack-2012-Speakers_Talks#Eric_Freyssinet|Eric Freyssinet]]
+
| [[GreHack-2013-Speakers_Talks#Herbert_Bos|Herbert Bos]]
| [[GreHack-2012-Speakers_Talks#Botnets:_from_observation_to_investigation|Botnets: from observation to investigation]]
+
| [[GreHack-2013-Speakers_Talks#Tain't_not_enough_time_to_fuzz_all_the_memory errors|'''Tain't not enough time to fuzz all the memory errors''']]
 
|-
 
|-
| 10h10-10h50
+
| 10h15-11h
| 40 min
+
| 45 min
| [[GreHack-2012-Speakers_Talks#Kostya_Kortchinsky|Kostya Kortchinsky]]
+
| [[GreHack-2013-Speakers_Talks#Juan_Caballero|Juan Caballero]]
| [[GreHack-2012-Speakers_Talks#10_years_later.2C_which_vulnerabilities_still_matter.3F|10 years later, which vulnerabilities still matter?]]
+
| TBA
 
|-
 
|-
| 10h50-11h
+
| 11h-11h25
| 10 min
+
| 25 min
| [[GreHack-2012-Speakers_Talks#Paul_Amar|Paul Amar]]
+
| [[GreHack-2012-Speakers_Talks#Home_Internet_Routers_for_Fun_.26_Profit|Home Internet Routers for Fun and Profit]]
+
|-
+
| 11h05 - 11h30
+
| 25min
+
 
| colspan=2 align=center |  
 
| colspan=2 align=center |  
 
Coffee break
 
Coffee break
 
|-
 
|-
| 11h30-12h
+
| 11h25 - 12h10
| 30 min
+
| 25min
| [[GreHack-2012-Speakers_Talks#Philippe_Elbaz-.C2.ADVincent|Philippe Elbaz-Vincent]]
+
| [[GreHack-2013-Speakers_Talks#Halvar_Flake|Halvar Flake]]
| [[GreHack-2012-Speakers_Talks#Attacks_on_the_randomness_of_Random_Number_Generators_.28RNG.29|Attacks on the randomness of Random Number Generators (RNG)]]
+
| TBA
 
|-
 
|-
| 12h-12h30
+
| 12h10-12h35
| 30 min
+
| 25 min
| [[GreHack-2012-Speakers_Talks#Olli-Pekka_Niemi|Olli-Pekka Niemi "0pi"]] & [[GreHack-2012-Speakers_Talks#Antti_Levomaki|Antti Levomaki]]
+
| [[GreHack-2013-Speakers_Talks#Ruo_Ando|Ruo Ando]]
| [[GreHack-2012-Speakers_Talks#Bypassing_Intrusion_Prevention_Systems|Bypassing Intrusion Prevention Systems]]
+
| [[GreHack-2013-Speakers_Talks#Unraveling_large_scale_geographical_distribution_of_vulnerable_DNS_servers_using_asynchronous_I/O_mechanism|'''Unraveling large scale geographical distribution of vulnerable DNS servers using asynchronous I/O mechanism''']]
 
|-
 
|-
| 12h30-13h
+
| 12h35-13h
| 30 min
+
| 25 min
| [[GreHack-2012-Speakers_Talks#Rikke_Kuipers|Rikke Kuipers]] & [[GreHack-2012-Speakers_Talks#Ari_Takanen|Ari Takanen]]
+
| [[GreHack-2013-Speakers_Talks#Eireann_Leverett|Eireann Leverett]]
| [[GreHack-2012-Speakers_Talks#Fuzzing_Embedded_Devices|Fuzzing Embedded Devices]]
+
| [[GreHack-2013-Speakers_Talks#Vulnerability_Inheritance_in_Programmable_Logic_Controllers|'''Vulnerability Inheritance in Programmable Logic Controllers''']]
 
|-
 
|-
| 13h - 14h
+
| 13h-14h
| colspan=3 | Lunch
+
| 1h
 +
| colspan=2 align=center |  
 +
Lunch
 
|-
 
|-
| 14h-14h40
+
| 14h - 14h25
| 40 min
+
| 25 min
| [[GreHack-2012-Speakers_Talks#David_Worth|David Worth]] & [[GreHack-2012-Speakers_Talks#Justin_Collins|Justin Collins]]
+
| [[GreHack-2013-Speakers_Talks#Alejandro_Nolla|Alejandro Nolla]]
| [[GreHack-2012-Speakers_Talks#Leveraging_Convention_over_Configuration_for_Static_Analysis_in_Dynamic_Languages|Leveraging Convention over Configuration for Static Analysis in Dynamic Languages]]
+
| [[GreHack-2013-Speakers_Talks#Amplification_DDoS_attacks_with_game_servers|'''Amplification DDoS attacks with game servers''']]
 +
|-
 +
| 14h25-14h50
 +
| 25 min
 +
| [[GreHack-2013-Speakers_Talks#Ludovic_Apvrille|Ludovic Apvrille]]
 +
| [[GreHack-2013-Speakers_Talks#Pre-filtering_Mobile_Malware_with_Heuristic_Techniques|'''Pre-filtering Mobile Malware with Heuristic Techniques''']]
 
|-
 
|-
  
| 14h40-15h20
+
| 14h50-15h15
| 40 min
+
| 25 min
| [[GreHack-2012-Speakers_Talks#Mathieu_Renard_GoToHack|Mathieu Renard]]
+
| [[GreHack-2013-Speakers_Talks#Markku-Juhani_Olavi_Saarinen|Markku-Juhani Olavi Saarinen]]
| [[GreHack-2012-Speakers_Talks#Mathieu_Renard_-_Practical_iOS_Apps_hacking|Practical iOS App Hacking]]
+
| [[GreHack-2013-Speakers_Talks#Developing_a_Grey_Hat_C2_and_RAT_for_APT_Security_Training_and_Assessment|'''Developing a Grey Hat C2 and RAT for APT Security Training and Assessment''']]
 
|-
 
|-
  
| 15h20 - 15h45
+
| 15h15 - 15h45
 
| 25 min
 
| 25 min
 +
| [[GreHack-2013-Speakers_Talks#Jagdish_Achara|Jagdish Achara]]
 +
| [[GreHack-2013-Speakers_Talks#Detecting_Privacy_Leaks_in_the_RATP_App:_how_we_proceeded_and_what_we_found|'''Detecting Privacy Leaks in the RATP App: how we proceeded and what we found''']]
 +
|-
 +
| 15h45-16h15
 +
| 30 min
 
| colspan=2 align=center |  
 
| colspan=2 align=center |  
 
Coffe break
 
Coffe break
 
|-
 
|-
| 15h45-16h15
+
| 16h15-16h45
 
| 30 min
 
| 30 min
| [[GreHack-2012-Speakers_Talks#Regis_Leveugle|Regis Leveugle]]
+
| [[GreHack-2013-Speakers_Talks#Mathieu_Cunche|Mathieu Cunche]]
| [[GreHack-2012-Speakers_Talks#Attacks_on_secure_hardware:_basics_and_examples|Attacks on secure hardware: basics and examples]]
+
| [[GreHack-2013-Speakers_Talks#I_know_your_MAC_Address:_Targeted_tracking_of_individual_using_Wi-Fi|'''I know your MAC Address: Targeted tracking of individual using Wi-Fi''']]
 
|-
 
|-
| 16h15-16h55
+
| 16h45 - 17h15
| 40 min
+
| 30 min
| [[GreHack-2012-Speakers_Talks#Dave_Penkler|Dave Penkler]] & [[GreHack-2012-Speakers_Talks#Boris_Balacheff|Boris Balacheff]]
+
| [[GreHack-2013-Speakers_Talks#Josselin_Feist|Josselin Feist]]
| [[GreHack-2012-Speakers_Talks#Dave_Penkler_.26_Boris_Balacheff_-_Cloud.2C_security_and_the_mobile_enterprise:_An_end-to-end_manageability_challenge|Cloud, security and the mobile enterprise: An end-to-end manageability challenge]]
+
| [[GreHack-2013-Speakers_Talks#Statically_Detecting_Use_After_Free_on_Binary_Code|'''Statically Detecting Use After Free on Binary Code''']]
 
|-
 
|-
| 17h - 17h25
+
| 17h15-17h40
 
| 25 min
 
| 25 min
| colspan=2 |
+
| [[GreHack-2013-Speakers_Talks#François_Desplanques|François Desplanques]]
Coffee break
+
| [[GreHack-2013-Speakers_Talks#Attacks_using_malicious_devices:_a way_to_protect_yourself_against_physical _access|'''Attacks using malicious devices: a way to protect yourself against physical access''']]
|-
+
| 17h25-17h45
+
| 20 min
+
| [[GreHack-2012-Speakers_Talks#Phil|"Phil"]]
+
| [[GreHack-2012-Speakers_Talks#Cryptage_audiovisuel_ou_.23FAIL_syst.C3.A9matique.3F|Cryptage audiovisuel ou #FAIL systématique?]]
+
 
|-
 
|-
  
| 17h45-18h05
+
| 17h40-18h10
| 20 min
+
| [[GreHack-2012-Speakers_Talks#Yann_Stephan_.22bswapeax.22|Yann Stephan "bswapeax"]]
+
| [[GreHack-2012-Speakers_Talks#Managed_Code_with_Licensing_does_not_mean_all_the_time:_Software_Protection|Managed Code with Licensing does not mean all the time: Software Protection]]
+
|-
+
| 18h05-18h35
+
 
| 4 or 5 min each
 
| 4 or 5 min each
 
| colspan=2 |
 
| colspan=2 |
 
[[GreHack-2012-rump_sessions|Rump sessions]]
 
[[GreHack-2012-rump_sessions|Rump sessions]]
 
|-
 
|-
18h35 - 20h
+
18h10 - 20h40
 
| colspan=2 align=center |
 
| colspan=2 align=center |
 
Cocktail (conference tickets only)
 
Cocktail (conference tickets only)
| rowspan=4 | [[GreHack-2012-CTF-DJ_artist_bands-accepted|accepted music bands/DJ/artists play]]
+
| rowspan=3 | [[GreHack-2013-CTF-DJ_artist_bands-accepted|accepted music bands/DJ/artists play]]
  
 
|-
 
|-
 
| colspan=3 |  
 
| colspan=3 |  
* End of [[GreHack-2012-Speakers_Talks|GreHack Conference]]
+
* End of [[GreHack-2013-Speakers_Talks|GreHack Conference]]
* Entrance for the [[GreHack-2012-CTF|GreHack CTF]]
+
* Entrance for the [[GreHack-2013-CTF|GreHack CTF]]
 
|-  
 
|-  
| 20h - 21h30
+
| 20h40 - 05h40
| colspan=2 | CTF: Pizza Dinner + Rules explanation
+
|-
+
| 21h30 - 06h00
+
 
| colspan=2 | [[GreHack-2012-CTF|Capture The Flag ]] contest
 
| colspan=2 | [[GreHack-2012-CTF|Capture The Flag ]] contest
  
 
|}
 
|}

Version du 2 octobre 2013 à 16:17

Detailled agenda/planning for GreHack 2013

Friday, November, 15th 2013

schedule duration authors title
08h00-09h30 1h30

attendees arrival + welcome pack + breakfast

9h30-10h15 45 min Herbert Bos Tain't not enough time to fuzz all the memory errors
10h15-11h 45 min Juan Caballero TBA
11h-11h25 25 min

Coffee break

11h25 - 12h10 25min Halvar Flake TBA
12h10-12h35 25 min Ruo Ando Unraveling large scale geographical distribution of vulnerable DNS servers using asynchronous I/O mechanism
12h35-13h 25 min Eireann Leverett Vulnerability Inheritance in Programmable Logic Controllers
13h-14h 1h

Lunch

14h - 14h25 25 min Alejandro Nolla Amplification DDoS attacks with game servers
14h25-14h50 25 min Ludovic Apvrille Pre-filtering Mobile Malware with Heuristic Techniques
14h50-15h15 25 min Markku-Juhani Olavi Saarinen Developing a Grey Hat C2 and RAT for APT Security Training and Assessment
15h15 - 15h45 25 min Jagdish Achara Detecting Privacy Leaks in the RATP App: how we proceeded and what we found
15h45-16h15 30 min

Coffe break

16h15-16h45 30 min Mathieu Cunche I know your MAC Address: Targeted tracking of individual using Wi-Fi
16h45 - 17h15 30 min Josselin Feist Statically Detecting Use After Free on Binary Code
17h15-17h40 25 min François Desplanques Attacks using malicious devices: a way to protect yourself against physical access
17h40-18h10 4 or 5 min each

Rump sessions

18h10 - 20h40

Cocktail (conference tickets only)

accepted music bands/DJ/artists play
20h40 - 05h40 Capture The Flag contest