Lady bird
Start End Integrated Circuit Reverse
Engineering 101 by Olivier
Thomas
Applied physical attacks on x86
systems by Joseph FitzPatrick
Low level hardware reversing
by Javier-Vazquez Vidal,
Ferdinand
Car Hacking - Hands On,
by Robert Leale
Tiny Embedded
System Firmware
Reverse Engineering
and Exploitation, by
Alexander Bolshev
Venue
8:15 9:00 Registration Registration Registration Registration Registration NH DEN HAAG
Prinses Margrietplantsoen 100
2595 BR Den Haag
The Netherlands
9:00 10:45 Training Training Training Training Training
10:45 11:15 Coffee Break
11:15 13:00 Training Training Training Training Training
13:00 14:00 Lunch Break
14:00 15:45 Training Training Training Training Training
15:45 16:15 Coffee Break
16:15 18:00 Training Training Training Training Training
Start End Integrated Circuit Reverse
Engineering 101 by Olivier
Thomas
Applied physical attacks on x86
systems by Joseph FitzPatrick
Low level hardware reversing
by Javier-Vazquez Vidal,
Ferdinand
Car Hacking - Hands On,
by Robert Leale
Tiny Embedded
System Firmware
Reverse Engineering
and Exploitation, by
Alexander Bolshev
Venue
9:00 10:45 Training Training Training Training Training NH DEN HAAG
Prinses Margrietplantsoen 100
2595 BR Den Haag
The Netherlands
10:45 11:15 Coffee Break
11:15 13:00 Training Training Training Training Training
13:00 14:00 Lunch Break
14:00 15:45 Training Training Training Training Training
15:45 16:15 Coffee Break
16:15 18:00 Training Training Training Training Training
Start End Amsterdam 2-4
(Talks)
Amsterdam 1
(Workshops)
Exhibition Area
8:00 9:00 Registration      
9:00 10:00 KEYNOTE:- Challenging real-world targets: from iPhone to insulin pump by Dr. Sergei Skorobogatov      
10:00 11:00 A Ghost in your Transmitter: analyzing polyglot signals for physical layer covert channels detection by Jose Lopes      
11:00 11:15 Coffee Break
11:15 12:15 Latest Metasploit Hardware Bridge Techniques by Craig Smith      
12:15 13:00 Reverse Engineering of Programmable Logic Bitstreams by Andrew Zonenberg      
13:00 14:00 Lunch Break
14:00 14:45 Flip a bit, grab a key: symbolic execution edition by Jasper van Woudenberg Xtensa Mongoose OS exploitation by Carel Van Rooyen and Philipp Promeuschel Lockpicking Village by Walter Belgers Car Hacking Village
14:45 15:30 To Guess Wrong is Expensive: A Deduce and Remove Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls by Sarani Bhattacharya
15:30 16:00 Coffee Break
16:00 16:45 Shaking trust in hardware: Attacks on hardware from software, Rowhammer and an MMU side channel from Javascript by Ben Gras Using inexpensive consumer-off-the-shelf platforms for high-risk travel security by Ryan Lackey Lockpicking Village by Walter Belgers Car Hacking Village
16:45 17:15 CXO Panel:- Who owns your car?
19:30 21:30 Invite Only Cocktail Dinner Sponsored by HackerOne      
Start End Amsterdam 2-4
(Talks)
Amsterdam 1
(Workshops)
Exhibition Area
10:00 11:00 KEYNOTE:- Hardware Trojans and the Internet of Things by Dr. Christof Paar      
11:00 11:15 Coffee Break
11:15 12:15 Hardware Root of Mistrust by Joe FitzPatrick      
12:15 13:00 KERNELFAULT: Pwning Linux using Hardware Fault Injection by Niek Timmers and Cristofaro Mune      
13:00 14:00 Lunch Break
14:00 14:45 A little review of security challenges in Silicon Photonics integrated circuits by Alexander Bolshev Black Box Debugging of Embedded Industrial Control Systems by Alexandru Iulian Ariciu and Robin Massink Lockpicking Village by Walter Belgers Car Hacking Village
14:45 15:30 TEMPEST attacks against AES by Craig Ramsay
15:30 16:00 Coffee Break
16:00 16:45 The RTOS Exploit Mitigation Blues by Jos Wetzels Automated Unpacking, Analysis and Comparision of Arbitrary Firmware Imges: The Firmware Analysis and Compare Tool (FACT) by Johannes Vom Dorp Lockpicking Village by Walter Belgers Car Hacking Village
16:45 17:15 CXO Panel:- (Un)Dependable Dependencies in Safety-Critical Infrastructure
17:15 17:45 Hack your body, one implant at a time by Patrick Paumen    
17:45 18:00 Prize Distribution for the CTF    
18:00 19:00 Network with Fellow Hacker