Skip to content
HOME⁺
Humberger Toggle Menu
LOGIN
MAIN tracks
august 24 & 25
REGISTER
WELCOME ADDRESS
No data was found
opening keynote
No data was found
CLOSING keynote
No data was found
MAIN TRACK AGENDA
day 1
MORNING COFFEE
08:00 - 08:45
08:45
WELCOME NOTE
09:00
KEYNOTE 1: The Upside of Falling Down: Embracing Failure to be a Better Hacker (and Human)
BREAK
(10;00 - 10:30)
TRACK 1
08:45
WELCOME NOTE
09:00
KEYNOTE 2: TBA
TRACK 2
10:30
gVisor: Modern Linux Sandboxing Technology
11:30
How to Design Your Own Electronic Attack Device
LUNCH
(12:30 - 14:00)
11:30
It Was Harder to Sniff Bluetooth Through My Mask During The Pandemic
12:28
TESTING PAGE: ALPChecker – Detecting Spoofing and Blinding Attacks
14:00
Lazarus Group’s Undercover Operations: Large-Scale Infection Campaigns 2022 – 2023
15:00
Rogue CDB: Escaping from VMware Workstation Through The Disk Controller
BREAK
(16:00 - 16:30)
14:00
FrankeNAND – Extracting Info From Automotive Internet Units
15:00
Cracking the Shield: Analyzing and Reverse Engineering Antivirus Signatures
16:30
How NTLM Relay Ruins Your Exchange Servers
17:30
Timekiller: Leveraging Asynchronous Clock to Escape from QEMU/KVM
TCP/IP NETWORKING SOCIAL HOUR
18:30 - 20:00
day 2
MORNING COFFEE
08:30 - 10:00
TRACK 1
11:00
Locate Vulnerabilities of Ethereum Smart Contracts with Semi-Automated Analysis
13:00
Hacking into iOS’s VOLTE implementation
TRACK 2
10:00
Breaking ML Services: Finding 0-days in Azure Machine Learning
11:00
Developing Penetration Tools with AI: Leveraging Language Models like ChatGPT
LUNCH
(12:00 - 13:00)
14:00
Scarlet OT – OT Adversary Emulation for Fun and Profit
15:30
Hunting for Amazon Cognito Security Misconfigurations
13:00
GPTHound – Your Active Directory Security Assistant
14:00
Take a Picture of Your App Code – Android MRI Interpreter
BREAK
(15:00 - 15:30)
16:30
Windows Kernel Security: A Deep Dive into Two Exploits Demonstrated at Pwn2Own
17:30
CLOSING KEYNOTE: Systems Alchemy: The Transmutation of Hacking
15:30
NVMe: New Vulnerabilities Made Easy
16:30
From Unknown Parameter to Root: A Story of Unexpected Intrusion Testing Results
17:30
CLOSING KEYNOTE: Systems Alchemy: The Transmutation of Hacking
CTF PRIZE GIVING & CLOSING CEREMONY
HITB POST CONFERENCE RECEPTION
Open to all attendees
main track SPEAKERS
Prateek Gianchandani
Head of Product & Application Security
Careem
Ruben Gonzalez
Security Researcher and Trainer
Neodyme
Sebastien Deleersnyder
Co-founder & CTO
Toreon
Dr. Altaf Shaik
Senior Research Scientist
Technische Universität Berlin, Germany
Kamel Ghali
Security Delivery Manager, Accenture
Chief Event Coordinator, Car Hacking Village
KaiJern @xwings Lau
Founder
Qiling Framework
Aloysius Cheang
Chief Security Officer
Huawei Middle East & Central Asia
Georges Bolssens
Principal Consultant
Toreon
Davide Cioccia
Founder
DCODX
H.E. Dr. Mohamed Al Kuwaiti
Head of Cyber Security
United Arab Emirates Government
Monnappa K A
Security Researcher and Trainer
Hassan Khan Yusufzai
Security Researcher
Danish Tariq
Security Engineer & Security Researcher
Dhiraj Mishra
Security Researcher
fuzzing.at
Zubin Devnani
Security Researcher
fuzzing.at
Daniel Ehrenreich
Consultant and Lecturer
Secure Communications and Control Experts
Mohammed Tareq Alawadhi
Founder & CEO
Bugloud
Alan White
Managed Defense Consulting
Mandiant (Google)
Dr. Thierry Lestable
Chief Researcher
Digital Science Research Center (DSRC)
Dr. Chaouki Kasmi
Chief Researcher
Directed Energy Research Center, Technology Innovation Institute (TII)
Prof. Ernesto Damiani
Director of the Center for Secure Cyber-Physical System
Khalifa University
Selene Giupponi
Secretary General
Women4Cyber Italy
H.E. Faisal Al Bannai
Chairman of the Board of Directors
EDGE
Dr Shreekant (Ticky) Thakkar
Chief Research Officer
Secure Systems Research Centre, TII
Prof. Hoda Alkhzaimi
Co-Chair
World Economic Forum Global Cyber Security Future Council on Cyber Security
Mikko Hypponen
Chief Research Officer
WithSecure
Dr. Bushra Al-Blooshi
CEO Senior Consultant
Dubai Electronic Security Center (DESC)
Dr. Najwa Aaraj
Chief Researcher
Cryptography Research Center and the Autonomous Robotics Research Center, TII
COMMSEC track & LABS
august 24 & 25
REGISTER
day 1
MORNING COFFEE
09:00 - 10:30
10:30
COMMSEC: Bugs in Blocks
11:30
COMMSEC: Shining a Light On Solar System Cyber Security
16:30
COMMSEC: B(l)utter – Reversing Flutter Applications by using Dart Runtime
17:00
COMMSEC: Hardware Backdooring an eScooter
LUNCH
(12:30 - 14:00)
14:00
HITB LAB: Bring Your Own SOAR: Automated Incident Response
BREAK
(16:00 - 16:30)
17:30
COMMSEC: Big Match – How I Learned to Stop Reversing and Love the Strings
TCP/IP NETWORKING SOCIAL HOUR
18:30 - 20:00
day 2
MORNING COFFEE
09:00 - 10:00
10:00
COMMSEC 009
10:30
COMMSEC 010
11:00
COMMSEC 011
11:30
COMMSEC 012
LUNCH
(12:00 - 13:00)
13:00
HITB LAB: Build Your Own Drone Attacking Device
BREAK
(15:00 - 15:30)
15:30
COMMSEC 013
16:00
COMMSEC 014
16:30
COMMSEC 015
17:00
COMMSEC 016
JOIN US FOR CLOSING KEYNOTE IN TRACK 1
My profile
Logout
My profile