Loading…
CanSecWest 2021 has ended

Log in to bookmark your favorites and sync them to your phone or calendar.

Tuesday, April 13
 

12:00pm PDT

KEYNOTE: The Misinformation Age: Defending Against Deepfakes
The Information Age has led to the birth of the Misinformation Age. Commercial and open-source projects exist that can allow anyone to create a “deepfake” video. This has caused industry leaders such as DARPA, Microsoft, Facebook, Intel, and Adobe to pursue initiatives to help people to discern whether online content should be trusted. These initiatives have even gone down to the hardware level with companies such as Qualcomm who recently added the ability to perform hardware-secured photo capture to their latest Snapdragon mobile processors. This presentation will share an overview of the current state of deepfake technology and then explore the different proposals for combatting misinformation including a detailed discussion on the Content Authenticity Initiative.

Speakers
avatar for Peleus Uhley

Peleus Uhley

Lead Security Strategist, Adobe Inc.
Peleus Uhley has been a part of the security industry for over 20 years. As the lead security strategist at Adobe, he assists the company with proactive and reactive security. He is a frequent blogger, presenter, and an active member of the security community. Prior to joining Adobe... Read More →


Tuesday April 13, 2021 12:00pm - 1:00pm PDT
Public Streams secwest.net
 
Wednesday, April 14
 

11:30am PDT

Large-scale Security Analysis of IoT Firmware
Today, the number of IoT devices in both the private and corporate sectors are steadily increasing. IoT devices like IP cameras, routers, printers, and IP phones have become ubiquitous in our modern homes and enterprises. To evaluate the security of these devices, a security analysis has to be performed for every single device. Since manual analysis of a device and reverse engineering of a firmware image is very time-consuming, this is not practicable for large-scale analysis.

To be able to conduct a large-scale study on the security of embedded network devices, an approach was applied that allows a high number of firmware images to be statically analyzed. For data acquisition, a crawler was used to identify and retrieve publicly available firmware images from the Internet. In this way, more than 10,000 individual firmware images have been collected. The firmware was then automatically unpacked and analyzed regarding security-relevant aspects.

For the first time, this research provides insights into the distribution of outdated and vulnerable software components used in IoT firmware. Furthermore, a comprehensive picture of the use of compiler-based exploit mitigation mechanisms in applications and libraries is given. Factory default accounts were identified, and their passwords recovered as far as possible. Also, a large amount of cryptographic material was extracted and analyzed. Besides, a backdoor has been discovered in the firmware of several products that allows remote access to the devices via SSH after triggering the functionality. The backdoor has been verified and confirmed by the vendor and two official CVE numbers have been assigned.

The results of this large-scale analysis provide an interesting overview of the security of IoT devices from 20 different manufacturers. IoT firmware was analyzed regardless of device type or architecture and a broad picture of their security level was obtained.


Click here to view.

Daniel Nussko
Daniel Nussko is an independent security researcher and information security professional with years of progressive experience in cyber security. His main expertise lies with the penetration testing of enterprise networks and web applications. He holds a Master's degree in IT Security from the University of Offenburg in Germany. When not involved in customer projects, he enjoys doing research in the field of IoT security.






Speakers
avatar for Daniel Nussko

Daniel Nussko

Penetration Tester, Freelancer


Wednesday April 14, 2021 11:30am - 12:30pm PDT
AirMeet/gather.town secwest.net
 
Thursday, April 15
 

5:00pm PDT

The Risk of AI Abuse: Be Careful with Your Voice
Artificial Intelligence (AI) technology has been widely deployed and made human lives much more convenient. It has become the cornerstone of many technologies, such as computer vision, machine translation and self-driving etc. But the AI also exposes some potential security problems. Especially when it is used inappropriately, the technology is very likely to become a weapon of the underground industry. In a word, AI is a double-edged sword.  In this talk, we focus on AI security problems and the abuse of AI-based speech techniques.  We will show how to use a few pieces of somebody’s voice to imitate his or her voice and make a fake call.


Mengyun Tang
Mengyun Tang is currently working as a senior security researcher at Tencent Zhuque Lab and holds broad experience in AI security and computer vision. Her research results have been published on NDSS, TIFS etc. She is also a speaker of DEFCON, CanSecWest 2019 and CanSecWest 2020.

Dylan Di
Dylan Di is a senior security researcher of Tencent Zhuque Lab. Now his job is mainly focusing on AI model & infrastructure security research. He is also a former threat intelligence researcher & red teamer, proficient at binary reversing and hacking weapon construction.






Speakers
avatar for Mengyun Tang

Mengyun Tang

Senior Security Researcher, Tencent Zhuque Lab
Mengyun Tang is currently working as a senior security researcher at Tencent Zhuque Lab and holds broad experience in the AI security and computer vision. Her research results have been published on NDSS, TIFS and ECCV etc. She is also a speaker of DEFCON, CanSecWest 2019 and CanSecWest... Read More →


Thursday April 15, 2021 5:00pm - 6:00pm PDT
AirMeet/gather.town secwest.net

6:00pm PDT

Silent Corner : Going Deeper into LPWAN Security
LPWAN  (low-power wide-area network) is a mainstream IoT communication  technology and has been widely used in smart cities and other fields.  LoRaWAN and NB-IoT are the most mainstream technologies in the LPWAN,  and there are hundreds of millions of IoT devices using these two  technologies. LoRaWAN is used by Internet manufacturers, and NB-IoT is  promoted by 3GPP as the scene evolution of 5G mMTC. With the development  of LPWAN, this field is worthy of in-depth security research.
In  recent years, the security research on LPWAN has mostly focused on the  LoRaWAN specification and communication keys, However, in the real  world, there is little research on the security risks of the supply chain of LoRaWAN.  In addition, because NB-IoT is more complex and closed than LoRaWAN, security research is also more difficult, and there are very few studies on the supply chain, threat models and security risks of NB-IoT chips. In this talk, we will disclose the security research findings in the field of LPWAN supply chain for the first time. 

Watch here.

Yuxiang Li
Yuxiang Li is a senior security researcher at the Tencent Blade Team, specialized in the study of mobile security, IoT security, and browser security. He has reported multiple vulnerabilities in Android and Chrome and has received acknowledgments from many companies such as Google. He was a speaker of BlackHat USA / DEF CON / HITB AMS.
Huiyu Wu
Wu HuiYu is a senior security researcher of Tencent Blade Team. Now his job is mainly focusing on AIoT security research. He is also a bug hunter, winner of GeekPwn 2015 & 2020, and speaker of BlackHat USA, DEFCON, HITB and POC.


Speakers
avatar for Huiyu Wu

Huiyu Wu

Senior Security Researcher, Blade Team, Tencent
avatar for Yuxiang Li

Yuxiang Li

Senior Security Researcher, Tencent Blade Team
Yuxiang Li is a senior security researcher at the Tencent Blade Team, specialized in the study of mobile security, IoT security, and browser security. He has reported multiple vulnerabilities in Android and Chrome and has received acknowledgments from many companies such as Google... Read More →


Thursday April 15, 2021 6:00pm - 7:00pm PDT
AirMeet/gather.town secwest.net
 
Tuesday, April 20
 

12:00pm PDT

Security probe of Qualcomm MSM data services
Mobile Station Modem (MSM) is an ongoing series of a 2G/3G/4G-capable SoCs designed by Qualcomm starting in the early 1990s. MSM has always been and will be a popular target for security research because hackers want to find a way to attack a mobile device remotely just by sending it a SMS or crafted radio packet. But 3GPP protocols are not the only entry point  into the modem. Android also has an ability to communicate with the modem processor through the Qualcomm MSM Interface (QMI). In our research, we looked at the QMI as a way to attack MSM data services.  
MSM is managed by Qualcomm real-time OS (QuRT) that cannot be debugged or  dumped even on rooted Android devices. We reverse-engineered QuRT and  built a feedback fuzzer for QDSP6 processor architecture to probe MSM data services for bugs.  
We are going to show real-world examples of using the QMI API to query MSM data services, our experience with unpacking and fuzzing MSM code, and a vulnerability we discovered that can be used to control the modem and dynamically patch it from the application processor.

Watch here.

Slava Makkaveev
Slava Makkaveev is a Security Researcher at Check Point. Holds a PhD in Computer Science. Slava has found himself in the security field more than ten years ago and since that gained vast experience in reverse engineering and vulnerability research. His research projects were presented at HITB, Recon, DEF CON 25/26/28.


Speakers
SM

Slava Makkaveev

Security Researcher, Check Point


Tuesday April 20, 2021 12:00pm - 1:00pm PDT
AirMeet/gather.town secwest.net

2:30pm PDT

Down the Rabbit Hole: A Close Look at Ethernet
You've probably used Wireshark or a similar packet sniffer to look at TCP/IP traffic and Ethernet frames at the byte level. But just how deep does the rabbit hole go? Dig down into the Ethernet physical layer with a high-bandwidth oscilloscope and see what actual Ethernet frames look like on the wire. We'll cover the 10Base-T, 100Base-TX, 1000base-X, and 10Gbase-R standards in depth with example waveforms and protocol analysis, as well as brief discussion of 1000baseT and 40Gbase-SR4 and the "killer packet" vulnerability in the 100baseTX specification.

Watch here.

Andrew Zonenberg is an associate principal security consultant at IOActive’s embedded security lab. His interests include semiconductor reverse engineering, embedded systems security, operating systems, high speed signal integrity, and computer architecture. He has a Ph.D in computer science from Rensselaer Polytechnic Institute.

Speakers

Tuesday April 20, 2021 2:30pm - 3:30pm PDT
AirMeet/gather.town secwest.net

3:30pm PDT

Kubernetes Gotchas - Hacking and Defending Kubernetes
In this talk, we'll demonstrate Kubernetes and AWS attacks, attacking a scenario themed on the movie "Real Genius." .  We'll discuss multiple defenses available to every Kubernetes and AWS user. In part of the attack, we'll use the open source Peirates tool. Come learn how to attack Kubernetes and break your attacks!

You will learn about how to attack and avoid several "gotcha" configurations, where the cluster maintainer's intent doesn't match the attacker's view of the defenses. You'll also learn how some of these defenses really work, including the Kubernetes to AWS linkages.


Watch here.

Jay Beale
Jay Beale works on Kubernetes and cloud native security, both as a professional threat actor and as a co-lead of the Kubernetes project's Security Audit working group. He's the architect and a developer on the Peirates attack tool for Kubernetes. In the past,Jay created two tools used by hundreds of thousands of individuals, companies and governments, Bastille Linux and the Center for Internet Security's first Linux/UNIX scoring tool. He has led training classes on Linux security and Kuberntes at the Black Hat, CanSecWest, RSA, and IDG conferences, as well as in private corporate training, since 2000. As an author, series editor and speaker, Jay has contributed to nine books and two columns and given over one hundred public talks. He is CTO of the information security consulting company InGuardians.


Speakers
avatar for Jay Beale

Jay Beale

CTO, InGuardians
Jay Beale works on Kubernetes and cloud native security, both as a professional threat actor and as a member of the Kubernetes project, where he previously co-led the Security Audit working group. He's the architect of the Peirates attack tool for Kubernetes, as well as of the @Bustakube... Read More →


Tuesday April 20, 2021 3:30pm - 4:30pm PDT
AirMeet/gather.town secwest.net
 
Wednesday, April 21
 

10:00am PDT

How to Secure Blockchain Smart Contracts
Smart contracts are a revolutionary aspect of blockchain technology that help us enforce an agreement between parties involved in transactions, transferring value and information without the presence of a third-party. Smart contracts scale well and provide faster solutions as they remove third parties traditionally involved in transactions. The main challenge is that smart contracts are not inherently secure and many security issues have taken place, some resulting in massive financial losses. In one incident (the "DAO" hack), the attacker managed to retrieve approx. 3.6 million Ether. This presentation will go through all known smart contract application vulnerabilities and discuss mitigations as well as best security practices for developing secure smart contracts.

Watch here.

Iman Sharafaldin
Iman is an Application Security Lead at Forward Security who is passionate about all things code. He has more than 8 years of cybersecurity and software related experience and is also a PhD candidate in Computer Science with more than 1000 citations on his cybersecurity related publications in top journals and conferences. In his spare time, he researches and invests in crypto and blockchain technologies.


Speakers
avatar for Iman Sharafaldin

Iman Sharafaldin

Application Security Lead, Forward Security
Iman is an Application Security Lead at Forward Security who is passionate about all things code. He has more than 8 years of cybersecurity and software related experience and is also a PhD candidate in Computer Science with more than 1000 citations on his cybersecurity related publications... Read More →


Wednesday April 21, 2021 10:00am - 11:00am PDT
AirMeet/gather.town secwest.net

11:00am PDT

Panel: Teens Explain Internet Security to Infosec Professionals
Watch here.

Moderators
avatar for Pete Herzog

Pete Herzog

CEO, Urvin AI
Pete Herzog is an experienced security expert with as much time in the trenches as in the tower with both offense and defense. He is the co-founder of mutliple companies: Urvin.ai to scale AI from the lab to production, Akiya Research a prototyping company, Invisibles to create music... Read More →

Wednesday April 21, 2021 11:00am - 12:00pm PDT
AirMeet/gather.town secwest.net

1:00pm PDT

Panel: Drone Security
More details to be added.

Watch here.

Pavel Haintz

Pavel Haintz is the CEO and founder of Think Sensor Research Inc, a private company based in Burnaby, BC, Canada which specializes in underwater sonar sensors, sensor systems and autonomous underwater vehicles. Pavel Haintz has over 20 years in the marine technology sector, he has worked for a large international marine technology company before founding Think Sensor Research in 2008. Think Sensor Research is mainly targeting the marine engineering markets with its 3D sonar and other products. One of the main markets that Think Sensor Research is currently expanding into is maritime surveillance using radar, sonar and infrared sensors to detect and track small air, surface and underwater targets that can consist of aerial drones and autonomous surface and underwater vehicles. Pavel Haintz holds a BASc and a MEng in System Engineering from the School of Engineering Science, Simon Fraser University. During his studies he founded the Aerial Robotics Group which built autonomous airships, airplanes and helicopters and competed in the International Aerial Robotics Competition in the late 1990s and early 2000s.

Speakers
avatar for Dragos Ruiu

Dragos Ruiu

ceo, dragostech.com inc.
Dragos is the organizer of Canada's and Japan's oldest, most technical, information security conferences at CanSecWest and PacSec, for 21 and 17 years respectively. He started out as a computer dinosaur from back when computers used paper tape (P DP11) and along the way has worked... Read More →
PH

Pavel Haintz

Pavel Haintz is the CEO and founder of Think Sensor Research Inc, a private company based in Burnaby, BC, Canada which specializes in underwater sonar sensors, sensor systems and autonomous underwater vehicles. Pavel Haintz has over 20 years in the marine technology sector, he has... Read More →


Wednesday April 21, 2021 1:00pm - 2:30pm PDT
AirMeet/gather.town secwest.net

3:00pm PDT

Unmasking the Chameleons of the Criminal Underground: An Analysis From Bot To Illicit Market Level.
Large corporations have access to, and use, incredibly sophisticated anti-fraud systems that monitor dozens of signals each time one of their customers or employees log into their web portal. These signals include what browser is used, what plugins are installed, and even the language of the users’ software. Past investigations have shown that malicious actors use malware to build profiles of their victims, and create virtual environments that replicate precisely the victims’ computers’ fingerprints. These profiles can be loaded up in specially crafted browser plugins and used in account takeover attacks. These profiles are sold on private markets and can fetch in the hundreds of dollars when they also include the cookies and credentials of the victims for financial institutions. The aim of this presentation is to build on past research and to map over a period of a month all of the Canadian activities of a machine fingerprint market. Our analysis extends past research first by developing a new understanding of how, and which, Canadians are targeted by this type of attack. Secondly, it presents models that predict not only the price of profiles for sale – i.e., what makes a profile more valuable – but also which profiles will end up being sold among the thousands that are for sale. Through these analyses, we end up with estimations for the Canadian market for profiles for sale, and propose hypotheses as to the size of the impact of these illicit activities on the Canadian economy. The market for fingerprinting victims is growing exponentially, and is promising to be, along with ransomware, one of the biggest threats of the coming year. With more detailed knowledge about this problem, companies and individual victims will be better suited to protect themselves against these attacks, and limit the monetization of the criminal underground.

Watch here.

David Décary-Hétu
David Hétu is Co-Founder and Chief Research Officer of Flare Systems. David holds a doctorate in criminology from the University of Montreal. His main research interests are in illicit online markets and the impact of technology on crime, both from the perspective of offenders and from the perspective of the legislator. David's research has been published in leading academic journals (e.g., British Medical Journal) and presented at leading conferences (Botconf, HOPE). He is regularly invited to share his analysis of cybercrime in the media. David developed the DATACRYPTO software tool to monitor offender activity on the darknet and co-developed the BitCluster software tool to track cryptocurrency transactions.


Speakers
avatar for David Hétu

David Hétu

Co-Founder / Chief Research Officer, Flare Systems
David Hétu has a Ph.D. in criminology from the Université de Montréal and his main research interest is in online illicit markets and the impact of technology on crime, whether it be from the offenders’ point of view or from a regulation point of view. David’s research has... Read More →


Wednesday April 21, 2021 3:00pm - 4:00pm PDT
AirMeet/gather.town secwest.net
 
Thursday, April 22
 

5:00pm PDT

Quick-Win Triage Forensics for Macs
This is an excerpt of an upcoming dojo on quick-win forensics. This practical tutorial will walk beginners through a first attempt at forensics on a Mac.  Attendees will take home the knowledge and skill on what and how to quickly triage a bunch of Macs to zero in on the ones that need further examination.

Watch here.

Albert Hui

Albert Hui has 20+ years experience doing digital forensics and fraud investigation data analytics. He has given testimonies to courts of law across multiple countries as a criminal defence expert witness, as well as having trained law enforcement officers. Equally adept at private investigations as well as legal proceedings, Albert has been quoted in HKICPA (Hong Kong Institute of Certified Public Accountants)'s magazine on his use of unsupervised machine learning for fraud examination.

Albert has spoken at Black Hat, ACFE Fraud Conference, and HTCIA Forensic Conference among others.'



Speakers
avatar for Albert Hui

Albert Hui

Security Ronin
Criminal Defence Digital Forensics Expert WitnessFraud Investigator specializing in Data Analytics


Thursday April 22, 2021 5:00pm - 5:45pm PDT
AirMeet/gather.town secwest.net

6:00pm PDT

Disinformation Risk Management: Bringing Cognitive Security to a Modern SOC
This talk is about cognitive security risk management and how security operations centre (SOC) services can be augmented to provide disinformation response. We'll examine the core functions of cognitive security, it's application, in theory and practice, at organization, country, and global scales, with examples including SJ Terp's recent work with the United Nations Development Programme.

A core challenge organizations face when including cognitive security practices into their operations is the effective allocation of detection, response, and mitigation resources. Using insights from AMITT (Adversarial Misinformation and Influence Tactics and Techniques), an open-source framework for describing the strategic, operational, and tactical elements of influence operations, we'll explore how responders can allocate resources to minimize attack surface, vulnerabilities, and potential losses.

Watch here.

Speakers
avatar for S J Terp

S J Terp

data scientist, CogSecCollab
Misinformation, adtech, crisismapping, artificial intelligence, machine learning and information security. Also Terry Pratchett, industrial photography, cool bridges and other awesome architecture.
avatar for Roger Johnston

Roger Johnston

Security Specialist, Ubisoft
Roger Johnston is a security specialist at Ubisoft and a member of CogSecCollab.  In 2020, Cognitive Security Collaborative set up the CTI League's disinformation team, and continues to work with groups around the world to bootstrap communities of disinformation responders.His work... Read More →


Thursday April 22, 2021 6:00pm - 7:00pm PDT
AirMeet/gather.town secwest.net

7:00pm PDT

A journey on discovering vulnerabilities and exploiting SGX enclave frameworks
Intel SGX provides hardware support to protect sensitive data. Cloud vendors,
such as Microsoft Azure and Google Cloud, have developed SGX software frameworks,
such as Asylo and OpenEnclave, and offered Intel SGX-enabled virtual machines
for confidential computing.

We conduct an in-depth analysis of Microsoft OpenEnclave SDK (powered by Azure
CC) and Google Asylo SDK (powered by GCP), discovering 20+ vulnerabilities (14
CVEs assigned) in them. We show that these vulnerabilities allow an attacker to
read and write arbitrary enclave protected memory by exploiting the
vulnerability,  which affects all SGX enclaves using the vendor-provided SDK.
Our attack is more realistic for exploitation than side-channel attacks and can
reliably retrieve and manipulate protected enclave data.

In this talk, we will go through the SGX enclave security model and analyze
attack surfaces. In this model, developers have to partition trusted components
of an application as TCB into the SGX enclave. After partitioning, any
out-enclave data flowing into these trusted components become untrusted and
require additional checks and sanitization. To reduce the attack surface,
developers declare enclave boundary interfaces with annotated parameters in an
EDL file and generate boilerplate code for marshaling the parameters. However,
this EDL approach is insufficient since it lacks checks for nested pointers,
context-aware data, shared memory, etc.

Also, we cover typical mistakes enclave developers made and share real-world
vulnerability cases we have discovered with our bug-finding tool, SGXRay. We
discuss attack scenarios and the consequences once successfully exploited by
attackers outside the enclave. This talk also includes demonstrations of our
enclave exploitation with arbitrary read and write capability to enclave memory
by leveraging the bugs found by us.

Watch here.

Speakers
avatar for Zhaofeng Chen

Zhaofeng Chen

Senior Staff Security Researcher, Baidu USA
Zhaofeng Chen is a security researcher from Baidu Security. He is experienced in both offensive and defensive security on confidential computing, system security, and mobile security. He has designed multiple data/mobile security products and is the PPMC of the Apache Teaclave (Incubating... Read More →


Thursday April 22, 2021 7:00pm - 8:00pm PDT
AirMeet/gather.town secwest.net

8:00pm PDT

Defeating attackers’ lateral movement through Network Deception
During this talk, we will discuss the various stages of lateral movement from credential theft techniques, privilege escalation and finding network targets to code execution methods, we will retrospect on some infamous lateral movement methods.  We will also discuss how to detect and mislead an attacker’s lateral movement using network deception and approaches that can be taken to build the deceptive network.

Watch here.

Chintan Shah
Chintan Shah is currently working as a Lead Security Researcher with McAfee Intrusion Prevention System team and holds broad experience in the network security industry. He primarily focuses on Exploit and vulnerability research, building Threat Intelligence frameworks, Reverse engineering techniques, advanced threats and malware analysis. Chintan had researched and uncovered multiple targeted and espionage attacks in the past and worked with multiple enforcement agencies and blogging about them. He holds multiple patents in the exploit detection and prevention techniques . His interests lies in software fuzzing for vulnerability discovery, reversing engineering and analyzing exploits, malwares and translating the research into product improvement.






Speakers
avatar for Chintan Shah

Chintan Shah

Sr. Technical Lead - Security Research, McAfee


Thursday April 22, 2021 8:00pm - 9:00pm PDT
AirMeet/gather.town secwest.net
 
Friday, April 23
 

5:30pm PDT

Social Event in our Multimedia Virtual Space
Our new experimental party, will feature a full 3d virtual DJ stage and light show with intriguing live real time visuals, shown in our Robot Steampunk CyberSpider virtual event space. Soon to be accessible off the Convention Deck of CSW21-EngagementStation.


Friday April 23, 2021 5:30pm - 10:00pm PDT
Steampunk Cyberspider CSW21-EnagagementStation
 
Tuesday, April 27
 

12:00pm PDT

Panel: Car Hacking
Watch here.

Moderators
avatar for Dragos Ruiu

Dragos Ruiu

ceo, dragostech.com inc.
Dragos is the organizer of Canada's and Japan's oldest, most technical, information security conferences at CanSecWest and PacSec, for 21 and 17 years respectively. He started out as a computer dinosaur from back when computers used paper tape (P DP11) and along the way has worked... Read More →

Speakers
avatar for Charlie Miller

Charlie Miller

Cruise Automation
Charlie Miller is a senior security engineer at Uber ATC, a hacker, and a gentleman. Back when he still had time to research, he was the first with a public remote exploit for both the iPhone and the G1 Android phone. He is a four-time winner of the CanSecWest Pwn2Own competition... Read More →


Tuesday April 27, 2021 12:00pm - 1:00pm PDT
AirMeet/gather.town secwest.net
 
Wednesday, April 28
 

10:00am PDT

TBONE: Drone vs. Tesla
Watch here.

Speakers

Wednesday April 28, 2021 10:00am - 11:00am PDT
AirMeet/gather.town secwest.net

11:00am PDT

Certification of AIs
Artificial Intelligence is one of the fastest growing technologies of the 21st century. AI accompanies us in our daily lives when interacting with technical applications. TÜV AUSTRIA Group and the Institute for Machine Learning at the Johannes Kepler University Linz therefore propose a certification process and an audit catalog for Machine Learning applications.

Watch the talk here


Berhard Nessler

Bernhard Nessler is university assistant at the Institute for Machine Learning in Sepp Hochreiter's team at the Johannes Kepler University Linz; his research topics include Deep Learning, Computational Neuroscience. He is head of the industrial collaborations for technical applications of deep learning and autonomous robotics; he is a founding member of the European AI Excellence Initiative ELLIS and a member of the ELLIS Coordination Committee (ECC).

Tom Vogt

Tom Vogt is Senior Information Security Architect at TÜV AUSTRIA in Vienna; he advises on and audits information security including ISO27001 and IEC62443 as well as various related topics such as business continuity, secure software development or risk management and analysis; he also participates in various research projects to contribute expert knowledge on security aspects, including autonomous driving and artificial intelligence.

Speakers
BN

Bernhard Nessler

University Assistant at the Institute for Machine Learning, Johannes Kepler University Linz
Bernhard Nessler is university assistant at the Institute for Machine Learning in Sepp Hochreiter's team at the Johannes Kepler University Linz; his research topics include Deep Learning, Computational Neuroscience. He is head of the industrial collaborations for technical applications... Read More →
TV

Tom Vogt

Information Security Architect, TÜV AUSTRIA
Tom Vogt is Senior Information Security Architect at TÜV AUSTRIA in Vienna; he advises on and audits information security including ISO27001 and IEC62443 as well as various related topics such as business continuity, secure software development or risk management and analysis; he... Read More →


Wednesday April 28, 2021 11:00am - 12:00pm PDT
AirMeet/gather.town secwest.net

12:00pm PDT

KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities
The monolithic nature of modern OS kernels leads to a constant stream of bugs being discovered. It is often unclear which of these bugs are worth fixing, as only a subset of them may be serious enough to lead to security takeovers (i.e., privilege escalations). Therefore, researchers have recently started to develop automated exploit generation techniques (for UAF bugs) to assist the bug triage process. In this project, we investigate another top memory vulnerability in Linux kernel — out-of-bounds (OOB) memory write from heap.

Watch here.

Zhiyun Qian
Zhiyun Qian is the Everett and Imogene Ross associate professor in the CSE department at the University of California Riverside. His main research interests are in the area of system and network security, including vulnerability discovery, side channel analysis, applied program analysis, system building, and measurement of real-world security problems. He is a recipient of the ACM CCS distinguished paper award in 2020, Applied Networking Research Prize from IRTF in 2019, NSF CAREER Award in 2017, Facebook Internet Defense Prize Finalist in 2016, and the most creative idea award from Geekpwn 2016.


Speakers
avatar for Zhiyun Qian

Zhiyun Qian

Associate Professor, University of California, Riverside
Zhiyun Qian is the Everett and Imogene Ross associate professor in the CSE department at the University of California Riverside. His main research interests are in the area of system and network security, including vulnerability discovery, side channel analysis, applied program analysis... Read More →


Wednesday April 28, 2021 12:00pm - 1:00pm PDT
AirMeet/gather.town secwest.net
 
Thursday, April 29
 

5:00pm PDT

Influence Operations 101
Over the past 5 years, the term ‘fake news’ has become more and more common. Previously referred to as propaganda, or campaigns to influence the thoughts and perceptions of the masses, we now call the same thing ”active measures.”

Regardless of semantics, Influence Operations are very real and have existed for centuries; In the exact same way as nailing paper to a door or inventing the printing press, the Communications Revolution of the last half century has again forever changed the method used.

What has not changed however, is the strategic objectives of the latest incarnation of the Influencer. Beware of geeks bearing gifts… because of course the ’new’ factor is the geek. With the advent of social media, Influence Operations have acquired a new method of distribution, which is more dynamic, far reaching, and allows better targeting and highly accurate feedback. Although this method is indeed very powerful, it is not what IO is all about. 

 IO is way more than bots on social or mainstream media. Those operations are designed to influence human beings, not bots. While chasing Russian bots on Twitter and Facebook is relatively easy, it does little to deter the end goal of a IO campaign, especially since the objectives are difficult to infer. This makes counteracting an IO campaign and denying its objectives particularly difficult. 

In this talk, the author presents the basics in communications theory, to make these concepts accessible to non-practitioners in the field.   The presenter will cover the two-step flow of information, gatekeeping, agenda-setting, priming, framing, spiral of silence, echo chambers, and cultivation, as well as the effects of some of the mental processes that these actions have. 

This talk will stay away from political topics and current events as attitudes towards those topics may interfere with perception. Furthermore, there will be no guilt - i.e., attribution - assigned. 

The talk is the geek version by a geek who endeavored in social sciences and communication. The hope is that it will make this field more understandable to geeks.

Watch here.

Krassimir Tzvetanov
Krassimir Tzvetanov is a graduate student at Purdue University focusing his research on Threat Intelligence, Operational Security Research, and Social Media Influence Operations, in the cyber domain.
In the recent past Krassimir was a security architect at Fastly, a content delivery network (CDN) designed to accelerate content delivery as well as serve as a WAF and a shield against DDoS attacks. His current focus is on incident response and investigations, threat intelligence and security systems architecture.
In the past he worked for hardware vendors like Cisco and A10 focusing on threat research and information exchange, DDoS mitigation features, product security and security software development best practices. Before joining Cisco, Krassimir was Dedicated Paranoid (security) at Yahoo!, Inc. where he focused on designing and securing the edge infrastructure of the production network. Part of his duties included dealing with DDoS and abuse. Before Yahoo! Krassimir worked at Google, Inc. as an SRE for two mission critical systems, the ads database supporting all incoming revenue from ads and the global authentication system which served all of the company applications.
Krassimir is very active in the security research and investigation community, has a number of contributions to FIRST SIGs, as well as participates in the Honeynet Project.
In addition, Krassimir ran the BayThreat security conference and has contributed to a number of other events like DefCon, where he ran the Radio Communications group, and ShmooCon and DC650.
Krassimir holds Bachelors in Electrical Engineering (Communications) and Masters in Digital Forensics and Investigations.



Thursday April 29, 2021 5:00pm - 6:00pm PDT
AirMeet/gather.town secwest.net

8:00pm PDT

Panel: WiFi Hacking, Warwalking, and More...
We'll be talking about war warwalking, packet capturing all the things, access point reliability,and mesh WiFi.

Watch here.

Speakers
avatar for Dragos Ruiu

Dragos Ruiu

ceo, dragostech.com inc.
Dragos is the organizer of Canada's and Japan's oldest, most technical, information security conferences at CanSecWest and PacSec, for 21 and 17 years respectively. He started out as a computer dinosaur from back when computers used paper tape (P DP11) and along the way has worked... Read More →
avatar for El Kentaro

El Kentaro

El Kentaro is the guy who builds wifi gadgets for fun. Unfortunately many of his creations look like a "bomb" and can be a hassle to travel with.. Kentaro has been involved with the hacker scene for over a decade, spoken at DEF CON and other various conferences across the globe. During... Read More →


Thursday April 29, 2021 8:00pm - 9:00pm PDT
AirMeet/gather.town secwest.net