< NULLCON 2025 - GOA />

Schedule

1st March 2025

*All timings mentioned are in IST

Venue: Birla Institute Of Technology And Science (BITS), Goa

START END Talks (Auditorium) Bounty Craft Track (DLT 07) CXO Track (DLT 09) iOS & macOS Track (DLT 10) Workshop (DLT 06) Live Bug Hunting (D104)
8:15 9:15 Registration
9:30 10:10 [KEYNOTE] Fueling the Future: Building Robust Engines for a Secure Digital World - Daniel Cuthbert
10:15 10:55 The Future is Trustless: How zkVMS and zkTLS Transform Bug - Anto Joseph Live Bug Bounty
10:55 11:15 Coffee Break
11:20 12:00 How Ecovacs robots got hacked and what we can learn from it - Dennis Giese Google Give Me Vulnz - Cameron Vincent [PANEL] AI in SecOps: Enhancing Incident Response with Intelligence Broken isolation - draining your credentials from popular macOS password managers - Wojciech Regula Live Bug Bounty
12:05 12:45 Your Identity is Mine: Techniques and Insights from OS Identity Providers Research - Maor Abutbul What the PHUZZ?! Finding 0-days in PHP Apps with Coverage-guided Fuzzing - Sebastian Neef Fireside Chat - Software Supply Chain Security State of iOS Jailbreaking in 2025 - Lars Fröder
12:45 14:00 Lunch Break
14:00 14:40 The hidden ART of rolling shellcode decryption - Tijme Gommers MLOps Under Attack: Threat Modeling Modern AI Systems by Sandeep Singh [PANEL] Converging IT and OT security: Unified strategies for protection, detection, and response MacOS Lockdown Mode: A Forensic Deep Dive - Bhargav Rathod [WORKSHOP] Instrumenting the Unknown: Leveraging Frida for Binary Analysis on Linux by Bharath Kumar & Akshay Jain Live Bug Bounty
14:45 15:25 Fuzzing Rust Smart Contracts: Writing A Bug Printer Engine From Scratch - Daniel Schmidt & Kevin Valerio Guilt by Association: Pwning Millions of Smart Weighing Machines with API and Hardware Hacking by Eugene Lim [PANEL] Navigating Data Protection in the age of globalisation Predator Malware: Trust Broken at the Core - Matthias Frielingsdorf
15:30 16:10 How to Teach Threading to a Dolphin - Andras Tevesz [PANEL] Crowdsourced Cybersecurity: Should Companies Trust Ethical Hackers with Defense? [PANEL] AI versus AI : Reimagining Security Operation [WORKSHOP] Drawing parallels between iOS and MacOS Pentesting with DVMA - Vaibhav Lakhani
16:10 16:25 Coffee Break
16:25 17:05 Reversing Large Deep learning AI Models - Yashodhan Vivek Mandke Project Dusseldorf: finding out-of-band vulnerabilities at cloud scale - Michael Hendrickx [PANEL] Cyber Tech 2030: The Next Chapter in AI, Zero Trust & Offensive Defense [WORKSHOP] Drawing parallels between iOS and MacOS Pentesting with DVMA - Vaibhav Lakhani Live Bug Bounty
19:15 21:45 Corporate Networking Dinner Party
END OF DAY 1

2nd March 2025

*All timings mentioned are in IST

Venue: Birla Institute Of Technology And Science (BITS), Goa

START END Talks (Auditorium) Supply Chain (DLT 07) CXO Track (DLT 09) Workshop (DLT 06) Winja Track (DLT 10) Live Bug Hunting (D104)
9:30 10:10 [Keynote]
10:15 10:55 Trapped by the CLI - William Robinet Null Community - Global Meetup Resume & Career Clinic Satellite Communications: Analyzing and Protecting Space-Based Assets - Drishti Jain
10:55 11:15 Coffee Break
11:20 12:00 Kernel Conquest: Breaking Boundaries and Demystifying Kernel SU for Root Access in Azure Cloud Shell - Abhishek & Krishna Hidden in Plain Sight: Large-Scale Exposure of Orphaned Commits on Major Git Platforms - Kumar Ashwin [PANEL] Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best? [WORKSHOP] Bridging the Gap: Enhancing OT Security with an Affordable Testbed - Prateek Singh & Gayatri Relekar Winja CTF Live Bug Bounty
12:05 12:45 Windows Keylogger Detection: Targeting Past and Present Keylogging Techniques.- Asuka Nakajima Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks - Arshid Shyam Kumar & Chinmay Krishna R [PANEL] Cyber Fusion Center: The Command Center for Integrated Cyber Defense
12:45 14:00 Lunch Break
14:00 14:40 Will It Run? Fooling EDRs with command lines using empirical data - Wietze Beukema Securing the chains: Building defensive layers for software supply chains - Akhil Mahendra, Hritik Vijay & Yadhu Krishna M [PANEL] Unlocking India’s Cyber Potential through Strategic Policies, R&D Support, and Robust Public-Private Partnerships [WORKSHOP] Radio Hacking by Karan Sajnani, Jaden Furtado & Sachin Gowda Winja CTF Live Bug Bounty
14:45 15:25 eKYC Crisis: Securing the Lockers - Kartik Lalan [WORKSHOP] Surfing the Wild Wild West of Open Source Software Supply Chain Risks - Abhisek Datta [PANEL] Tackling Automotive Hardware Vulnerabilities
15:30 16:10 Cyber Security from Telco lens at Sanjeev Dhallam [PANEL] From Code to Defense: Why Developers Are the New Security Leaders
16:10 16:25 Coffee Break
16:25 17:05 Prize & Closing Note [WORKSHOP] Surfing the Wild Wild West of Open Source Software Supply Chain Risks - Abhisek Datta TBA
END OF DAY 2