8:15 |
9:15 |
Registration |
| |
9:20 |
9:30 |
Opening Note |
| |
9:30 |
10:10 |
[KEYNOTE] LLMs everywhere - The future is now and the past keeps repeating itself by Joern Schneeweisz |
| |
10:15 |
10:55 |
Unlock hidden Superpowers in MediaTek Wi-Fi Chips by Daniel Wegemer & Edoardo Mantovani |
|
HackIM CTF & Lock Picking |
10:55 |
11:15 |
Coffee Break |
11:15 |
11:55 |
Exploiting the Impossible: A Deep Dive into A Vulnerability Apple Deems Unexploitable by Mickey Jin |
Live Bug Bounty |
HackIM CTF & Lock Picking |
12:00 |
12:40 |
Finding bugs in V8: a formal verification approach by Simon Gerst |
12:45 |
14:00 |
Lunch Break |
14:00 |
14:30 |
Why Is Process Isolation Indispensable?: Stealing All macOS Sensitive Info with a Single Vulnerability by Koh M. Nakagawa |
Live Bug Bounty |
HackIM CTF & Lock Picking |
14:35 |
15:15 |
Derandomizing Kernel Object Locations with Software- and Hardware-Induced Side Channels by Lukas Maar |
15:20 |
16:00 |
Your MCP Server Executes Commands - But From Whom? By Simcha Kosman |
16:00 |
16:15 |
Coffee Break |
16:15 |
17:00 |
[PANEL] Industrial Systems in the Crosshairs: What It Really Takes to Defend OT in 2025 |
Live Bug Hunting |
HackIM CTF & Lock Picking |
19:00 |
22:00 |
Invite Only Dinner & Drinks (Corporate Badge Holders) |
END OF DAY 1 |