![]() |
|
---|---|
![]() |
Training Room: Lahaina 1 |
![]() |
10:00 am - 05:00 pm |
![]() |
|
---|---|
![]() |
Training Room: Lahaina 2 |
![]() |
10:00 am - 05:00 pm |
![]() |
|
---|---|
![]() |
Training Room: Lahaina 3 |
![]() |
10:00 am - 05:00 pm |
![]() |
|
---|---|
![]() |
Training Room: Lahaina 4 |
![]() |
10:00 am - 05:00 pm |
![]() |
|
---|---|
![]() |
Registration |
![]() |
Come pick up your conference badge. (Note: All that is needed is the email address you registered with). |
![]() |
|
---|---|
![]() |
Welcome and opening remarks |
![]() | |
---|---|
![]() | "Sweet QuaDreams or Nightmare before Christmas? Dissecting an iOS 0-Day" (Christine Fossaceca & Bill Marczak) |
![]() | |
---|---|
![]() | "macOS Stealers: Stealing Your Coins, Cookies and Keychains" (Maddie Stewart & Suweera De Souza) |
![]() | |
---|---|
![]() | "Swift Reversing in 2024 - It's not so bad :)" (Christopher Lopez) |
![]() | |
---|---|
![]() | "Trace the Base: Unraveling the iPhone’s Baseband Architecture to Defend Against Cellular Attacks" (Lukas Arnold) |
![]() |
|
---|---|
![]() |
Lunch |
![]() | |
---|---|
![]() | "Stealer Crossing: New Horizons" (Stuart Ashenbrenner & Alden Schmidt) |
![]() | |
---|---|
![]() | "Patch Different on *OS" (John McIntosh) |
![]() | |
---|---|
![]() | "Mach-O in Three Dimensions" (Jaron Bradley) |
![]() | |
---|---|
![]() | "Broken isolation - draining your credentials from popular macOS password managers" (Wojciech Reguła) |
![]() |
|
---|---|
![]() |
Afternoon Break |
![]() | |
---|---|
![]() | "iDecompile: Writing a Decompiler for iOS Applications"(Laurie Kirk) |
![]() | |
---|---|
![]() | "Endless Exploits: The Saga of a macOS Vulnerability Exploited Seven Times" (Mickey Jin) |
![]() | |
---|---|
![]() | "How to use ML to detect bad?" (Martina Tivadar) |
![]() | |
---|---|
![]() | "Unraveling Time: Understanding Time Formats in iOS Sysdiagnose for Security Forensics" (Lina Wilske) |
![]() |
|
---|---|
![]() |
main(); Event |
![]() |
Halona Kai |
![]() |
|
---|---|
![]() |
#OBTS Capture the Flag (CTF) |
![]() |
Maui Suites |
![]() |
Come participate in the Apple-themed CTF event and win prizes.
Note: To participate (in this limited-space) event, you must register here! |
![]() |
|
---|---|
![]() |
Welcome and opening remarks |
![]() | |
---|---|
![]() | "Triangulating TrueType Fonts On macOS: Reconstructing CVE-2023-41990" (Aleksandar Nikolic ) |
![]() | |
---|---|
![]() | "Apple's not so Rapid Security Response" (Mykola Grymalyuk) |
![]() | |
---|---|
![]() | "iPhone Backup Forensics" (Kinga Kieczkowska) |
![]() | |
---|---|
![]() | "A Better Way - YARA-X, Mach-O Feature Extraction, and Malware Similarity" (Jacob Latonis & Greg Lesnewich) |
![]() |
|
---|---|
![]() |
Lunch |
![]() | |
---|---|
![]() | "Tripwires in the Dark: Developing Behavior Detections for macOS" (Colson Wilhoit) |
![]() | |
---|---|
![]() | "Mac, where’s my Bootstrap?. What is the bootstrap server and how can you talk to it?" (Brandon Dalton & Fitzl Csaba) |
![]() | |
---|---|
![]() | "From Theory to Practise - Let’s find an iOS Commercial Spyware Sample" (Matthias Frielingsdorf) |
![]() | |
---|---|
![]() | "A Little Less Malware, A Little More Context: Using LLMs to Detect Malicious macOS Activity" (Kimo Bumanglag & Joseph Millman) |
![]() |
|
---|---|
![]() |
Afternoon Break |
![]() | |
---|---|
![]() | "Unveiling the Apple CVE-2024-40834 - A "shortcut" to the bypass road" (Marcio Almeida) |
![]() | |
---|---|
![]() | "Mirror Mirror: Restoring Reflective Code Loading on macOS" (Patrick Wardle) |
![]() |
|
---|---|
![]() |
Finale (+ prizes!) |
![]() |
|
---|---|
![]() |
exit(); Event |
![]() |
Halona Kai |