Admin

»Intro (Day 1)« | »Intro (Day 2)« | »Code of conduct, logistics, and more« | »HAK MTL Screening« | »Conference Party« | »Registration« | »Sponsor event« | »Thursday Lunch« | »Friday Lunch«


Olivier Bilodeau

»Capture-The-Flag 101«


Charles F. Hamilton

»Red Teaming Workshop«


Emilien Le Jamtel

»Trick or treat? Unveil the “stratum” of the mining pools«


Philippe Arteau

»Deserialization: RCE for modern web applications«


Laurent Desaulniers

»A good list of bad ideas«


Philip 'Soldier of FORTRAN' Young

»Mainframe Hacking in 2019«


Yashvier Kosaraju

»Container Security Deep Dive«


Joan Calvet

»The (Long) Journey To A Multi-Architecture Disassembler«


Mathieu Saulnier

»The SOC Counter ATT&CK«


Norman Shamas

»Safer Online Sex: Harm Reduction and Queer Dating Apps«


Louis Dion-Marcil

»Cache Me If You Can: Messing with Web Caching«


Patrick Ventuzelo

»Reversing WebAssembly Module 101«


Lisa Aichele

»Introduction to Return Oriented Programming«


Yamila Vanesa Levalle

»M33tfinder: Disclosing Corporate Secrets via Videoconferences«


Alexander Druffel

»Using angr to augment binary analysis workflow«


Florian Magin

»Using angr to augment binary analysis workflow«


Marc-andre Labonte

»Leveraging UART, SPI and JTAG for firmware extraction«


Masarah Paquet-Clouston

»From Bitcoins Amateurs to Experts: Fundamentals, grouping, tracing and extracting bulk information with open-source tools«


Thomas Pornin

»T1: Secure Programming For Embedded Systems«


Warren Mercer

»DNS On Fire« | »DNS On Fire«


Marc-Etienne M.Léveillé

»Hunting Linux Malware for Fun and Flags«


Maurelian

»Breaking smart contracts«


Olivier Arteau

»Introduction to appliance reverse engineering«


Erica Portnoy

»Making it easier for everyone to get Let's Encrypt certificates with Certbot«


Yolan Romailler

»One Key To Rule Them All - ECC Math Tricks«


Kelley Robinson

»Call Center Authentication«


Kurtis Armour

»Threat hunting in the cloud«


Francis Labelle

»Welcome to the Jumble: Improving RDP Tooling for Malware Analysis and Pentesting«


Kristin Del Rosso

»Using Geopolitical Conflicts for Threat Hunting - How Global Awareness Can Enable New Surveillanceware Discoveries«


Jacob Grant

»Threat hunting in the cloud«


Émilio Gonzalez

»Welcome to the Jumble: Improving RDP Tooling for Malware Analysis and Pentesting«


Apurva Kumar

»xRAT: Monitoring Chinese Interests Abroad With Mobile Surveillance-ware«


Shayan Eskandari

»Breaking smart contracts«


Chloé Messdaghi

»Fixing the Internet's Auto-Immune Problem: Bilateral Safe Harbor for Good-Faith Hackers«


Christian Paquin

»Post-Quantum Cryptography: today's defense against tomorrow's quantum hackers«


Silvia Väli

»64-bit shellcoding and introduction to buffer overflow exploitation on Linux«


Ioana-Andrada Todirica

»Trick or treat? Unveil the “stratum” of the mining pools«


Philippe Lamontagne

»Post-Quantum Manifesto«


Kelly Villanueva

»Hacking Heuristics: Exploiting the Narrative«


Hugo Porcher

»Wajam: From a Start-up to Massive Spread Adware«


Jonathan Marcil

»Threat Modeling«


Elissa Shevinsky

»What is our Ethical Obligation to Ship Secure Code?«


Arezou Hosseinzad-Amirkhizi

»xRAT: Monitoring Chinese Interests Abroad With Mobile Surveillance-ware«


Paul Rascagnères

»DNS On Fire« | »DNS On Fire«


Eva Galperin

»Where Do We Go From Here? Stalkerware, Spouseware, and What We Should Do About It«


Matt Mitchell

»Cybersecurity vs the world«


Martin Lebel

»Intro to badge soldering«