Infiltrate Security Conference

APRIL 26-27, 2018

Miami Beach

Exclusive Offense



Speaker Talk
Justin Schuh Keynote: Beset on all sides
Georgi Geshev / Robert Miller Logic Bug Hunting in Chrome on Android (Slides)
Andres Blanco 802.11 Protocol Chaos
Stephanie Archibald Sierra Had a Little Lamb (Slides)
Sophia d'Antoine / Peter LaFosse / Rusty Wagner Be a Binary Rockstar (Slides)
John Grigg Forget Enumerating a Network, Hack the SIEM and Win the War (Slides)
Ralf-Philipp Weinmann Did I hear a shell popping in your baseband?
James Forshaw COM in Sixty Seconds! (well minutes more likely) (Slides)
Berend-Jan Wever BugID - Automated Bug Analysis (Slides)
Marco Grassi / Liang Chen Remotely Compromising a Modern iOS Device
Andrew Johnson / Sacha Faust Cloud Post Exploitation Techniques (PDF) (PPTX)
Vasilis Tsaousoglou / Patroklos Argyroudis The Shadow Over Android (Slides)
Jean-Philippe Aumasson / Markus Vervier Hunting for Vulnerabilities in Signal


Speaker Talk
Nate Fick Keynote: Learning to win. (Video)
Sebastian Apelt Pwning Adobe Reader (Slides) (Video)
Omer Coskun Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts (Slides)
Artem Dinaburg Making a scalable automated hacking system: from DevOps to Pwning (Slides)
Joseph FitzPatrick The Tao of Hardware, the Te of Implants
Sean Heelan Automatic Root-Cause Identification for Crashing Executions (Slides) (Video)
Matthias Kaiser Java deserialization vulnerabilities - The forgotten bug class (Slides)
Travis Morrow and Josh Pitts Genetic Malware: Designing Payloads For Specific Targets (Slides) (Demo 1) (Demo 2) (Demo 3)
Natalie Silvanovich The Secret Life of ActionScript (Slides) (Video)
Ryan Stortz Swift Reversing (Slides) (Video)
Benjamin Watson All Your Browsers Belong To Us | Tales of Android Browser Exploitation (Slides) (Video)
Felix Wilhelm Xenpwn: Breaking Paravirtualized Devices (Slides)
Lisa Wiswell Hack the Pentagon


Speaker Talk
Ray Boisvert Keynote: Abyss or Turning Point: Strategy, Skills and Tradecraft in the Age of 21st Century Warfare (Video)
Alex Ionescu Insection: AWEsomely Exploiting Shared Memory Objects (Video)
Ram Shankar & Sacha Faust Data Driven Offense (Video)
Neil Archibald Modern Objective-C Exploitation (Video)
James Forshaw A Link to the Past: Abusing Symbolic Links on Windows (Video)
Rusty Wagner & Jordan Wiens Hacking Games in a Hacked Game (Video)
Braden Thomas Technical Keynote: Practical Attacks on DOCSIS (Video)
Nathan Rittenhouse Problems in Symbolic Fuzzing (Video)
Joaquim Espinhara & Rafael Silva MIMOSAWRITERROUTER - Abusing EPC on Cisco Router to collect data (Video)
Patrick Wardle Writing Bad@ss OS X Malware (Video)
Jacob Torrey HARES: Hardened Anti-Reverse Engineering System (Video)
Ben Nagy Fuzzing OSX At Scale (Video)


Full schedule (PDF): Day 1, Day 2, bios
Speaker Talk
Richard "Dickie" George Keynote (Video)
Sean Heelan Ghosts of Christmas Past: Fuzzing Language Interpreters Using Regression Tests (Slides)
Teddy Reed Analytics, And Scalability, And UEFI Exploitation! Oh My! (Video)
Suzanne E. Kecmer A Curious Cyber War: Business Owners vs. Investors (Video)
Christos Kalkanis Python, Deflowered: Shangrila (PDF)


Full schedule (PDF): Day 1, Day 2
Speaker Talk
Chris Eagle Keynote (Video)
Stephen Watt Keynote (Video)
Alberto Garcia Illera Enterprise Malware: There Is Always A Way (Video)
Miguel Turner Exfiltrate (Video)
Esteban Guillardoy Jurassic Jar: Their World, Our Rules (Video)
Zhenhua (Eric) Liu Advanced Heap Manipulation in Windows 8 (Video)


Speaker Talk
Thomas Lim Keynote (Video)
Andrew Cushman Keynote (Video)
Alexander Klink
Julian Waelde
Effective Denial of Service attacks against web application platforms (PDF)
Dan Rosenberg A Heap of Trouble: Breaking the Linux Kernel SLOB Allocator (PDF)
Julien Vanegue Modern Static Security Checking For C / C++ Programs (PDF)
Mark Wuergler Secrets in Your Pocket (Prezi, Video)
Michel Aubizzierre Unearthing the World's Best Bugs (PDF)


Bas Alberts
Massimiliano Oldani
Android Attacks (PDF)
Agustin Gianni
Sean Heelan
Attacking the WebKit Heap (PDF)
Cesar Cerrudo Bypassing Windows Services Protections (PDF)
Ronald Huizer Don't Give Credit: Hacking Arcade Machines (PDF)
Thomas Dullien
Halvar Flake
Exploitation and State Machines (PDF)
Esteban Guillardoy The Listening (PDF)
Tarjei Mandt Modern Kernel Pool Exploitation (PDF)
Jon Oberheide
Dan Rosenberg
Stackjacking Your Way to grsecurity/PaX Bypass (PDF)
Nico Waisman Strategic Surprise (PDF)