Infiltrate Security Conference


CONFERENCE
APRIL 6-7, 2017

FONTAINEBLEAU HOTEL
Miami Beach


Exclusive Offense

INFILTRATE 2016

Speaker Talk
Nate Fick Keynote: Learning to win. (Video)
Sebastian Apelt Pwning Adobe Reader (Slides)
Omer Coskun Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts (Slides)
Artem Dinaburg Making a scalable automated hacking system: from DevOps to Pwning (Slides)
Joseph FitzPatrick The Tao of Hardware, the Te of Implants
Sean Heelan Automatic Root-Cause Identification for Crashing Executions (Slides)
Matthias Kaiser Java deserialization vulnerabilities - The forgotten bug class (Slides)
Travis Morrow and Josh Pitts Genetic Malware: Designing Payloads For Specific Targets (Slides) (Demo 1) (Demo 2) (Demo 3)
Natalie Silvanovich The Secret Life of ActionScript (Slides)
Ryan Stortz Swift Reversing (Slides)
Benjamin Watson All Your Browsers Belong To Us | Tales of Android Browser Exploitation (Slides)
Felix Wilhelm Xenpwn: Breaking Paravirtualized Devices (Slides)
Lisa Wiswell Hack the Pentagon

INFILTRATE 2015

Speaker Talk
Ray Boisvert Keynote: Abyss or Turning Point: Strategy, Skills and Tradecraft in the Age of 21st Century Warfare (Video)
Alex Ionescu Insection: AWEsomely Exploiting Shared Memory Objects (Video)
Ram Shankar & Sacha Faust Data Driven Offense (Video)
Neil Archibald Modern Objective-C Exploitation (Video)
James Forshaw A Link to the Past: Abusing Symbolic Links on Windows (Video)
Rusty Wagner & Jordan Wiens Hacking Games in a Hacked Game (Video)
Braden Thomas Technical Keynote: Practical Attacks on DOCSIS (Video)
Nathan Rittenhouse Problems in Symbolic Fuzzing (Video)
Joaquim Espinhara & Rafael Silva MIMOSAWRITERROUTER - Abusing EPC on Cisco Router to collect data (Video)
Patrick Wardle Writing Bad@ss OS X Malware (Video)
Jacob Torrey HARES: Hardened Anti-Reverse Engineering System (Video)
Ben Nagy Fuzzing OSX At Scale (Video)

INFILTRATE 2014

Full schedule (PDF): Day 1, Day 2, bios
Speaker Talk
Richard "Dickie" George Keynote (Video)
Sean Heelan Ghosts of Christmas Past: Fuzzing Language Interpreters Using Regression Tests (Slides)
Teddy Reed Analytics, And Scalability, And UEFI Exploitation! Oh My! (Video)
Suzanne E. Kecmer A Curious Cyber War: Business Owners vs. Investors (Video)
Christos Kalkanis Python, Deflowered: Shangrila (PDF)

INFILTRATE 2013

Full schedule (PDF): Day 1, Day 2
Speaker Talk
Chris Eagle Keynote (Video)
Stephen Watt Keynote (Video)
Alberto Garcia Illera Enterprise Malware: There Is Always A Way (Video)
Miguel Turner Exfiltrate (Video)
Esteban Guillardoy Jurassic Jar: Their World, Our Rules (Video)
Zhenhua (Eric) Liu Advanced Heap Manipulation in Windows 8 (Video)

INFILTRATE 2012

Speaker Talk
Thomas Lim Keynote (mp4)
Andrew Cushman Keynote (mp4)
Alexander Klink
Julian Waelde
Effective Denial of Service attacks against web application platforms (PDF)
Dan Rosenberg A Heap of Trouble: Breaking the Linux Kernel SLOB Allocator (PDF)
Julien Vanegue Modern Static Security Checking For C / C++ Programs (PDF)
Mark Wuergler Secrets in Your Pocket (Prezi, mp4)
Michel Aubizzierre Unearthing the World's Best Bugs (PDF)

INFILTRATE 2011

Bas Alberts
Massimiliano Oldani
Android Attacks (PDF)
Agustin Gianni
Sean Heelan
Attacking the WebKit Heap (PDF)
Cesar Cerrudo Bypassing Windows Services Protections (PDF)
Ronald Huizer Don't Give Credit: Hacking Arcade Machines (PDF)
Thomas Dullien
Halvar Flake
Exploitation and State Machines (PDF)
Esteban Guillardoy The Listening (PDF)
Tarjei Mandt Modern Kernel Pool Exploitation (PDF)
Jon Oberheide
Dan Rosenberg
Stackjacking Your Way to grsecurity/PaX Bypass (PDF)
Nico Waisman Strategic Surprise (PDF)