Day 1
H2HC | H2HC University | |
---|---|---|
08:20 | Registration | |
09:00 | Opening Ceremony | |
09:30 | Keynote: From student of compilation to mother of decompilation | LLVM CFI and Cross-Language LLVM CFI Support for the Rust Compiler |
10:30 | Cryptographic Acceleration | Never let good research go to waste: frustrating bounty experiences might make good conference talks |
11:30 | Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!' | How to get Started with Bluetooth Hacking in Cars |
12:30 | Lunch Break | |
14:30 | A Closer Look At Freelist Hardening | Browser Exploitation the end of an Era |
15:30 | Old But Gold: The Underestimated Potency of Decades-Old Attacks on BMC Security | Local Privilege Escalation With I/O Rings |
16:30 | Break | |
17:00 | I'm High | Boiling The Ocean: Kernel Data Bus Analysis |
Day 2
H2HC | H2HC University | |
---|---|---|
10:00 | Keynote: The story of UEFI (and its security mitigations) | SQLi to Root Access: Exploiting a ISP infrastructure |
11:00 | The insides of an automatic defibrillator | CPU Vulns Are Easy |
12:00 | Lunch Break | |
14:00 | The Plague of Predictable Transient Numeric Identifiers | Two transient execution vulnerabilities you have probably not heard about: Snoopy and CRAP |
15:00 | LogoFAIL: Security Implications of Image Parsing During System Boot | Ghostbusting with CodeQL: finding gadgets for transient execution bugs |
16:00 | Break | |
16:31 | Hacking blockchains | Phantom: Exploiting Decoder-detectable Mispredictions |
17:30 | GatoROM: A New Attempt at Solving ROM Bit Ordering | INCEPTION: Exposing New Attack Surfaces with Training in Transient Execution |