CanSecWest 2023 Hybrid Conference
Our third ever offering of both in-person and on-line of the CanSecWest conference. Sixteen Dojos were offered over four days (March 18 to 21, 2023). Sixteen presentations and two workshops were presented over three days (March 22 to 24, 2023).
For descriptions of the presentations and presenters please follow this link.
List of Presentations
[KEYNOTE]: The People vs. The Tools: Why Can't We All Just Get Along? , Kara Nance
[KEYNOTE]: Commercial Warfare, Wolfgang Hagarty
Proactive Application Hardening with SCA Runtime Protection, Oscar Van der Meer, Shannon James Smith
Synthetic Memory Protections - Beyond R, W, and X, Theo DeRaadt
Hunting Windows Desktop Window Manager bugs for Privilege Escalation, WangJunjie Zhang, Wenyue Li, YiSheng He
Sandboxing ClamAV, Jonas Zaddach
Evolution of Stealth Packet Filter Rootkits, Richard Johnson
S3W: Snort 3.0 comes to Windows, Alessandro Pisani
xIoT Hacking Demonstrations & Strategies to Disappoint Bad Actors, John Vecchi
Two bugs with one PoC: Rooting Pixel 6 from Android 12 to Android 13, Yong Wang
Kubernetes Bakery Attacks : Stealing Cloud Roles, Jay Beale
Hacking around with COSPAS-SARSAT 406MHz, Aerospace Hacks, and their Growing Importance, Andrei Costin
The Attack you Dreamed of with Simulation, Sebastien Tricaud
Purple Clouds: PowerZure, Darin Smith
An Insider's Perspective on Integer Overflow Vulnerabilities, George Hughey, Rohit Mothe
AMI : Take a picture of your app code using the new Android MRI Interpreter, SungHyun Song
For more details on the workshops, please visit this link.
List of Workshops
AI Coding in Information Security, Dragos Ruiu
Applied Signals Analysis and EW Judo, Jonathan Andersson, Dragos Ruiu, Pavel Haintz
For a greater level of details, please follow this link. The names of the dojos and their presenters follows below.
List of Dojos
x86-64 OS Internals by Xeno Kovah
x86-64 Intel Firmware Attack & Defense by Xeno Kovah
Xeno’s All You Can Learn Buffet! by Xeno Kovah
x86-64 Assembly by Xeno Kovah
C/C++ Implementation Vulnerabilities Part 1 by Xeno Kovah
C/C++ Implementation Vulnerabilities Part 2 by Xeno Kovah
Black Belt Pentesting / Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation by Dawid Czagan
Windows Kernel Exploitation Advanced Training by Ashfaq Ansari
Windows Kernel Exploitation Foundations by Ashfaq Ansari
Introduction to Reverse Engineering with Ghidra by Kara Nance
Automation with Binary Ninja with Kyle Martin
Introduction to Binary Ninja with Kyle Martin
IPv6 Network Security with Scapy with Guillaume Valadon
Effectively Managing Neurodiverse Teams with Augustine Rosario
Attacking and Defending Linux, Kubernetes and Docker with Jay Beale
Full-Stack Pentesting Laboratory: 100% Hands-On + Lifetime LAB Access with Dawid Czagan
Android Hacking Masterclass with Zsombor Kovács