Sched.com Conference Mobile Apps
44CON 2018
has ended
Create Your Own Event
44CON 2018
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Attendees
Search
or browse by date + venue
Networking
Track 1
Track 2
Workshop 1
Workshop 2
Popular
menu
Menu
Schedule
Speakers
Attendees
Search
Popular Events
#1
Registration and Networking
#2
44CON 2018 Community Evening Opening
#3
Shubham Shah & Michael Gianarakis - Catch Me If You Can: Ephemeral Vulnerabilities in Bug Bounties
#4
Shubham Shah & Nathan Wakelam - Workshop: Bug Bounties: An introduction and path way to winning at bug bounties
#5
Saumil Shah - ARM IoT Firmware Emulation Workshop
#6
Enrique Nissim - Reverse Engineering and Bug Hunting on KMDF Drivers
#7
Kev Sheldrake - Exploits with Scratch
#8
Philippe Arteau - Kill All Humans... Bugs! : Machine Learning to the rescue of code review
#9
Jay Harris - Workshop: Breaking (All) Applications With Frida
#10
Julien Voisin & Thibault Koechlin - Security module for php7 - Killing bugclasses and virtual-patching the rest!
#11
Leighanne Galloway & Tim Yunusov - For the Love of Money: Finding and exploiting vulnerabilities in mobile point of sales systems
#12
Pete Herzog - They're All Scorpions - Succesful SecOps in a Hostile Workplace
#13
Gin O'Clock with Crowdfense
#14
44CON 2018 Opening
#15
Food and drinks with Crowdfense
#16
Lunch
#17
44CON 2018 Registration And Networking
#18
Gabriel Ryan - Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
#19
Morning Break
#20
Evening Session: PTP - Pwning the 44CON Nerf gun
#21
44CON - The Evening Session Opening
#22
Evening Session: Poetry Slam
#23
Guy Barnhart-Magen & Ezra Caltum - JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else
#24
David Rogers - The UK's Code of Practice for Security in Consumer IoT Products and Services
#25
Klaus Schmeh - How to Explain Post-Quantum Cryptography to a Middle School Student
#26
Evening Session: Nicky Bloor - Workshop: Diving Deep into Deserialization
#27
Evening Session: Duckies Den
#28
James Forshaw - Workshop: Windows Internals and Local Attack Surface Analysis using Powershell
#29
Charl Van Der Walt, Willem Mouton & Carl Morris - Workshop: Sys Mon! Why yu nuh logging dat?
#30
Kev Sheldrake & Tim Todd - Workshop: Developing Exploits with Scratch Workshop
#31
James Forshaw - Workshop: Windows Internals and Local Attack Surface Analysis using Powershell
#32
Jack Matheson- Using SmartNICs to Provide Better Data Center Security
#33
Evening Session: Philippe Arteau - Workshop: Orange is the new Hack: Introduction to Machine Learning with Orange
#34
Saumil Shah - Make ARM Shellcode Great Again
#35
Timo Hirvonen & Tomi Tuominen - Ghost in the Locks - owning electronic locks without leaving a trace
#36
Lunch
#37
Jay Harris - Automating myself out of a job - A pentesters guide to left shifting security testing
#38
Lawrence Munro & Matt Lorentzen - So You Want to Red Team?
#39
44CON Day 2 opens
#40
44CON Closing
#41
Charl Van Der Walt - Weak analogies make poor realities – are we sitting on a Security Debt Crisis?
#42
Break
#43
Gabriel Ryan - Workshop: Advanced Wireless Attacks Against Enterprise Networks
#44
Pete Herzog - Assumptions, the Deadliest Vulnerability
#45
Jie Zeng - Insight into fuzzing and pwning of Adobe Flash
#46
Rancho Han & Chen Nan - Subverting Direct X Kernel For Gaining Remote System
#47
Nicky Bloor - Ancient Traditions and The Great Enterprise Paywal
#48
Julien Voisin & Thibault Koechlin - Workshop: Security module for php7 - Killing bugclasses and virtual-patching the rest!
Popular by Type
All Types
Networking
Track 1
Track 2
Workshop 1
Workshop 2
Popular by Day
All days
Wednesday, Sep 12
Thursday, Sep 13
Friday, Sep 14
Recently Active Attendees
S4
Sched 44CON
TH
Tim Haynes
Guy Barnhart-Magen
Brian Whelton
Yestin
AB
Alex Butcher
Nuno Oliveira
O
ozkanaziz
More →