You are currently viewing an older schedule version. You can find the current version here.
You're currently viewing an offline version of the schedule, so it may be outdated. Refresh this page once you have an internet connection to see the current schedule.

Thursday, May 16, 2019

Conf 1
Conf 2
Workshop 3
Workshop 4 (Salon du president)
Workshop 1
Workshop 2
Other
08:00
09:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
20:00
21:00
22:00
Registration (Admin)
Intro (Day 1) (Admin)
Code of conduct, logistics, and more (Admin)
Where Do We Go From Here? Stalkerware, Spouseware, and What We Should Do About It (Eva Galperin)
The SOC Counter ATT&CK (Mathieu Saulnier)
The (Long) Journey To A Multi-Architecture Disassembler (Joan Calvet)
Making it easier for everyone to get Let's Encrypt certificates with Certbot (Erica Portnoy)
Welcome to the Jumble: Improving RDP Tooling for Malware Analysis and Pentesting (Francis Labelle, Émilio Gonzalez)
M33tfinder: Disclosing Corporate Secrets via Videoconferences (Yamila Vanesa Levalle)
Cache Me If You Can: Messing with Web Caching (Louis Dion-Marcil)
Fixing the Internet's Auto-Immune Problem: Bilateral Safe Harbor for Good-Faith Hackers (Chloé Messdaghi)
T1: Secure Programming For Embedded Systems (Thomas Pornin)
What is our Ethical Obligation to Ship Secure Code? (Elissa Shevinsky)
Safer Online Sex: Harm Reduction and Queer Dating Apps (Norman Shamas)
Trick or treat? Unveil the “stratum” of the mining pools (Emilien Le Jamtel, Ioana-Andrada Todirica)
Threat hunting in the cloud (Kurtis Armour, Jacob Grant)
Container Security Deep Dive (Yashvier Kosaraju)
Capture-The-Flag 101 (Olivier Bilodeau)
Threat Modeling (Jonathan Marcil)
Sponsor event (Admin)
Hunting Linux Malware for Fun and Flags (Marc-Etienne M.Léveillé)
64-bit shellcoding and introduction to buffer overflow exploitation on Linux (Silvia Väli)
Leveraging UART, SPI and JTAG for firmware extraction (Marc-andre Labonte)
Using angr to augment binary analysis workflow (Florian Magin, Alexander Druffel)
HAK MTL Screening (Admin)
Conference Party (Admin)

Friday, May 17, 2019

Conf 1
Conf 2
Workshop 3
Workshop 4 (Salon du president)
Workshop 1
Workshop 2
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
Intro (Day 2) (Admin)
Cybersecurity vs the world (Matt Mitchell)
DNS On Fire (Warren Mercer, Paul Rascagnères)
One Key To Rule Them All - ECC Math Tricks (Yolan Romailler)
Call Center Authentication (Kelley Robinson)
Hacking Heuristics: Exploiting the Narrative (Kelly Villanueva)
Wajam: From a Start-up to Massive Spread Adware (Hugo Porcher)
Post-Quantum Manifesto (Philippe Lamontagne)
Post-Quantum Cryptography: today's defense against tomorrow's quantum hackers (Christian Paquin)
A good list of bad ideas (Laurent Desaulniers)
Using Geopolitical Conflicts for Threat Hunting - How Global Awareness Can Enable New Surveillanceware Discoveries (Kristin Del Rosso)
xRAT: Monitoring Chinese Interests Abroad With Mobile Surveillance-ware (Apurva Kumar, Arezou Hosseinzad-Amirkhizi)
Mainframe Hacking in 2019 (Philip 'Soldier of FORTRAN' Young)
Intro to badge soldering (Martin Lebel)
Red Teaming Workshop (Charles F. Hamilton)
Reversing WebAssembly Module 101 (Patrick Ventuzelo)
From Bitcoins Amateurs to Experts: Fundamentals, grouping, tracing and extracting bulk information with open-source tools (Masarah Paquet-Clouston)
Breaking smart contracts (Maurelian, Shayan Eskandari)
Deserialization: RCE for modern web applications (Philippe Arteau)
Introduction to appliance reverse engineering (Olivier Arteau)
Introduction to Return Oriented Programming (Lisa Aichele)