| 9.00am - 9.10am |
Opening Ceremony |
|
| 9.10am - 10.00am |
Keynote - Special Redacted |
|
| 10.00am - 10.30am |
Break |
Break |
| 10.30am - 11.30am |
"Spectre and Meltdown: Speculative Execution Considered Harmful" - Yuval Yarom |
"AWS Serverless Exploitation Public Attack Vectors" - Matt Flannery |
| 11.30am - 12.00pm |
"BSides Entertainment System - Wearable gaming but your princess is in another castle" - Peter |
"Introduction to Cisco IOS analysis" - Adrian Justice |
| 12.00pm - 1.00pm |
Lunch |
Lunch |
| 1.00pm - 2.00pm |
Tech Keynote: "Making the most of your Hard(ware) work" - Joe FitzPatrick |
"The Count's A-to-Z of Windows Privilege Esclation" - Lukasz Gogolkiewicz |
| 2.00pm - 2.30pm |
"Contactless Access Control 2: Life, uh, finds a way" - Ryan & Jeremy |
"Get-GPTrashFire: Identifying and Abusing Vulnerable Configurations in MS AD Group Policy" - Mike Loss |
| 2.30pm - 3.30pm |
"How much can commodity hardware help on closing microarchitecture timing channels?" - Qian Ge |
"Zero clients in the enterprise - Skating on THIN ice" - Eldar Marcussen |
| 3.30pm - 4.00pm |
Break |
Break |
| 4.00pm - 4.30pm |
"It's a UNIX System - Intel ME, JTAG and FOSS BIOSes" - James "ec0" Hebden |
"A Wolf Among the Crowd" - Nilesh Kapoor |
| 4.30pm - 5.00pm |
"Demystifying SharePoint Security" - Michael Skelton |
| 5.00pm - 5.30pm |
"Microarchitectural attacks: reflecting on 45 years of research since 'A note on the confinement problem'" - Paul Harvey |
"Hacking Deterministic Bitcoin Addresses" - Michael McKinnon |
| 5.30pm - 5.40pm |
Day 1 close |
Day 1 close |