blackhat.com Open in urlscan Pro
2606:4700::6811:b385  Public Scan

Submitted URL: https://blackhat.com/us-24/briefings/schedule/#ovpnx&#8211
Effective URL: https://blackhat.com/us-24/briefings/schedule/
Submission: On November 15 via api from RU — Scanned from CA

Form analysis 1 forms found in the DOM

<form class="filter_wrapper">
  <div class="filters_wrapper" id="filters_wrapper">
    <div class="session_type_wrapper">
      <h3 id="filter_session_type" class="filter_header_background_shown filter_header">Session Type(s)</h3>
      <div class="session_type_list">
        <div class="select_clear_all_link"><a onclick="select_all_filter('session_type'); return false;" href="javascript:;" data-feathr-click-track="true" data-feathr-link-aids="65414312709dc1f319b80018">Select All</a> |
          <a onclick="clear_all_filter('session_type'); return false;" href="javascript:;" data-feathr-click-track="true" data-feathr-link-aids="65414312709dc1f319b80018">Clear</a> </div>
        <ul>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="session_type_18_checkbox" id="session_type_18_checkbox" class="session_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="session_type_18_checkbox" id="label_session_type_18" class="session_type_checkbox_label" href="#session/briefings">
                <div class="session_type_icon briefings_icon"></div> <span>Briefings</span>
              </label> </div>
            <div class="clear"></div>
          </li>
        </ul>
      </div>
    </div>
    <div class="format_type_wrapper">
      <h3 id="filter_format_type" class="filter_header_background_shown filter_header">Format(s)</h3>
      <div class="format_type_list">
        <div class="select_clear_all_link"><a onclick="select_all_filter('format_type'); return false;" href="javascript:;" data-feathr-click-track="true" data-feathr-link-aids="65414312709dc1f319b80018">Select All</a> |
          <a onclick="clear_all_filter('format_type'); return false;" href="javascript:;" data-feathr-click-track="true" data-feathr-link-aids="65414312709dc1f319b80018">Clear</a> </div>
        <ul>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="format_type_6-203_checkbox" id="format_type_6-203_checkbox" class="format_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="format_type_6-203_checkbox" id="label_format_type_6-203" class="format_type_checkbox_label" href="#format/-minute-keynote">
                <div class="format_type_icon -minute-keynote_icon"></div> <span>25-Minute Keynote</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="format_type_439-3_checkbox" id="format_type_439-3_checkbox" class="format_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="format_type_439-3_checkbox" id="label_format_type_439-3" class="format_type_checkbox_label" href="#format/-minute-briefings">
                <div class="format_type_icon -minute-briefings_icon"></div> <span>30-Minute Briefings</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="format_type_439-419_checkbox" id="format_type_439-419_checkbox" class="format_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="format_type_439-419_checkbox" id="label_format_type_439-419" class="format_type_checkbox_label" href="#format/-minute-briefings">
                <div class="format_type_icon -minute-briefings_icon"></div> <span>40-Minute Briefings</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="format_type_6-419_checkbox" id="format_type_6-419_checkbox" class="format_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="format_type_6-419_checkbox" id="label_format_type_6-419" class="format_type_checkbox_label" href="#format/-minute-keynote">
                <div class="format_type_icon -minute-keynote_icon"></div> <span>40-Minute Keynote</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="format_type_6-5_checkbox" id="format_type_6-5_checkbox" class="format_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="format_type_6-5_checkbox" id="label_format_type_6-5" class="format_type_checkbox_label" href="#format/-minute-keynote">
                <div class="format_type_icon -minute-keynote_icon"></div> <span>60-Minute Keynote</span>
              </label> </div>
            <div class="clear"></div>
          </li>
        </ul>
      </div>
    </div>
    <div class="track_type_wrapper">
      <h3 id="filter_track_type" class="filter_header_background_shown filter_header">Track(s)</h3>
      <div class="track_type_list">
        <div class="select_clear_all_link"><a onclick="select_all_filter('track_type'); return false;" href="javascript:;" data-feathr-click-track="true" data-feathr-link-aids="65414312709dc1f319b80018">Select All</a> |
          <a onclick="clear_all_filter('track_type'); return false;" href="javascript:;" data-feathr-click-track="true" data-feathr-link-aids="65414312709dc1f319b80018">Clear</a> </div>
        <ul>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1879_checkbox" id="track_type_1879_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1879_checkbox" id="label_track_type_1879" class="track_type_checkbox_label" href="#track/ai-ml--data-science">
                <div class="track_type_icon ai-ml--data-science_icon"></div> <span>AI, ML, &amp; Data Science</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1911_checkbox" id="track_type_1911_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1911_checkbox" id="label_track_type_1911" class="track_type_checkbox_label" href="#track/application-security-defense">
                <div class="track_type_icon application-security-defense_icon"></div> <span>Application Security: Defense</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1912_checkbox" id="track_type_1912_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1912_checkbox" id="label_track_type_1912" class="track_type_checkbox_label" href="#track/application-security-offense">
                <div class="track_type_icon application-security-offense_icon"></div> <span>Application Security: Offense</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1832_checkbox" id="track_type_1832_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1832_checkbox" id="label_track_type_1832" class="track_type_checkbox_label" href="#track/cloud-security">
                <div class="track_type_icon cloud-security_icon"></div> <span>Cloud Security</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1896_checkbox" id="track_type_1896_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1896_checkbox" id="label_track_type_1896" class="track_type_checkbox_label" href="#track/community--career">
                <div class="track_type_icon community--career_icon"></div> <span>Community &amp; Career</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1768_checkbox" id="track_type_1768_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1768_checkbox" id="label_track_type_1768" class="track_type_checkbox_label" href="#track/cryptography">
                <div class="track_type_icon cryptography_icon"></div> <span>Cryptography</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1867_checkbox" id="track_type_1867_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1867_checkbox" id="label_track_type_1867" class="track_type_checkbox_label" href="#track/cyber-insurance">
                <div class="track_type_icon cyber-insurance_icon"></div> <span>Cyber Insurance</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1913_checkbox" id="track_type_1913_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1913_checkbox" id="label_track_type_1913" class="track_type_checkbox_label" href="#track/cyber-physical-systems--iot">
                <div class="track_type_icon cyber-physical-systems--iot_icon"></div> <span>Cyber-Physical Systems &amp; IoT</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1769_checkbox" id="track_type_1769_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1769_checkbox" id="label_track_type_1769" class="track_type_checkbox_label" href="#track/defense">
                <div class="track_type_icon defense_icon"></div> <span>Defense</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1897_checkbox" id="track_type_1897_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1897_checkbox" id="label_track_type_1897" class="track_type_checkbox_label" href="#track/enterprise-security">
                <div class="track_type_icon enterprise-security_icon"></div> <span>Enterprise Security</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1933_checkbox" id="track_type_1933_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1933_checkbox" id="label_track_type_1933" class="track_type_checkbox_label" href="#track/exploit-development--vulnerability-discovery">
                <div class="track_type_icon exploit-development--vulnerability-discovery_icon"></div> <span>Exploit Development &amp; Vulnerability Discovery</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1947_checkbox" id="track_type_1947_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1947_checkbox" id="label_track_type_1947" class="track_type_checkbox_label" href="#track/forward-focus">
                <div class="track_type_icon forward-focus_icon"></div> <span>Forward Focus</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1887_checkbox" id="track_type_1887_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1887_checkbox" id="label_track_type_1887" class="track_type_checkbox_label" href="#track/hardware--embedded">
                <div class="track_type_icon hardware--embedded_icon"></div> <span>Hardware / Embedded</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1773_checkbox" id="track_type_1773_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1773_checkbox" id="label_track_type_1773" class="track_type_checkbox_label" href="#track/human-factors">
                <div class="track_type_icon human-factors_icon"></div> <span>Human Factors</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1950_checkbox" id="track_type_1950_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1950_checkbox" id="label_track_type_1950" class="track_type_checkbox_label" href="#track/industrial-control-systems">
                <div class="track_type_icon industrial-control-systems_icon"></div> <span>Industrial Control Systems</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1741_checkbox" id="track_type_1741_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1741_checkbox" id="label_track_type_1741" class="track_type_checkbox_label" href="#track/keynote">
                <div class="track_type_icon keynote_icon"></div> <span>Keynote</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1802_checkbox" id="track_type_1802_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1802_checkbox" id="label_track_type_1802" class="track_type_checkbox_label" href="#track/malware">
                <div class="track_type_icon malware_icon"></div> <span>Malware</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_17_checkbox" id="track_type_17_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_17_checkbox" id="label_track_type_17" class="track_type_checkbox_label" href="#track/mobile">
                <div class="track_type_icon mobile_icon"></div> <span>Mobile</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1884_checkbox" id="track_type_1884_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1884_checkbox" id="label_track_type_1884" class="track_type_checkbox_label" href="#track/network-security">
                <div class="track_type_icon network-security_icon"></div> <span>Network Security</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1827_checkbox" id="track_type_1827_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1827_checkbox" id="label_track_type_1827" class="track_type_checkbox_label" href="#track/platform-security">
                <div class="track_type_icon platform-security_icon"></div> <span>Platform Security</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1828_checkbox" id="track_type_1828_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1828_checkbox" id="label_track_type_1828" class="track_type_checkbox_label" href="#track/policy">
                <div class="track_type_icon policy_icon"></div> <span>Policy</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1898_checkbox" id="track_type_1898_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1898_checkbox" id="label_track_type_1898" class="track_type_checkbox_label" href="#track/privacy">
                <div class="track_type_icon privacy_icon"></div> <span>Privacy</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1779_checkbox" id="track_type_1779_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1779_checkbox" id="label_track_type_1779" class="track_type_checkbox_label" href="#track/reverse-engineering">
                <div class="track_type_icon reverse-engineering_icon"></div> <span>Reverse Engineering</span>
              </label> </div>
            <div class="clear"></div>
          </li>
          <li class="li2">
            <div class="checkbox_wrapper"> <input type="checkbox" onclick="filterSchedule();" name="track_type_1934_checkbox" id="track_type_1934_checkbox" class="track_type_checkboxes"> </div>
            <div class="checkbox_label_wrapper"><label for="track_type_1934_checkbox" id="label_track_type_1934" class="track_type_checkbox_label" href="#track/threat-hunting--incident-response">
                <div class="track_type_icon threat-hunting--incident-response_icon"></div> <span>Threat Hunting &amp; Incident Response</span>
              </label> </div>
            <div class="clear"></div>
          </li>
        </ul>
      </div>
    </div>
  </div>
</form>

Text Content

Informa

Black Hat is part of the Informa Tech Division of Informa PLC

 * Informa PLC
 * About us
 * Investor relations
 * Talent

This site is operated by a business or businesses owned by Informa PLC and all
copyright resides with them. Informa PLC's registered office is 5 Howick Place,
London SW1P 1WG. Registered in England and Wales. Number 8860726.

 * 
 * Events
   Black Hat Fall Online TrainingsBlack Hat EuropeBlack Hat Spring
   TrainingsBlack Hat AsiaUpcoming Events
 * Briefings
   BriefingsCall for PapersSecTor Briefings Call for PapersArchives
 * Trainings
   TrainingsOn-Demand Training CoursesSelf Assessment
 * Arsenal
   ArsenalResourcesCall for ToolsReview Board
 * Summits
 * Webinars
   WebinarsExecutive Interviews
 * Sponsorships
   Sponsorship OpportunitiesSponsor NewsJoin the Sponsor Mailing List
 * About
   About UsBlogIn the NewsPress ReleasesBriefings Review BoardTraining Review
   BoardSecTor Review BoardBriefings Call for PapersSecTor Briefings Call for
   PapersCode of ConductContact UsSustainability PledgePrivacy


USA 2024
Register Now
August 3-8, 2024

--------------------------------------------------------------------------------

Mandalay Bay / Las Vegas
Event Menu
 * AttendAttend
   Attendee RegistrationKnow Before You GoConference at a GlanceGroup
   DiscountPass ComparisonIn-Person ResourcesMedia RegistrationScholarshipsDEF
   CON PassesTravelSustainabilityCode of Conduct
 * TrainingsTrainings
   Training CoursesDaily ScheduleCertifications
 * BriefingsBriefings
   Keynotes & Main StageScheduleOverview & CPEsCall for Papers
 * ArsenalArsenal
   OverviewScheduleCall for Tools
 * SummitsSummits
   ScheduleCISO SummitThe AI SummitInnovators & Investors SummitOmdia Analyst
   SummitICS Micro SummitCyber Insurance Micro Summit
 * FeaturesFeatures
   Features OverviewFeatures ScheduleCommunityDay ZeroNOCParties &
   NetworkingStartup Spotlight Competition
 * Business HallBusiness Hall
   Business Hall OverviewSponsor ActivitiesSponsored SessionsWho's Hiring
 * SponsorsSponsors
   Become a SponsorEvent SponsorsSponsor News

All times are Pacific Time (GMT/UTC -7h)

 * All
 * Wednesday
 * Thursday

 * All
 * A-E
 * F-J
 * K-O
 * P-T
 * U-Z


All SessionsSpeakers



SESSION TYPE(S)

Select All | Clear
 * 
   Briefings
   


FORMAT(S)

Select All | Clear
 * 
   25-Minute Keynote
   
 * 
   30-Minute Briefings
   
 * 
   40-Minute Briefings
   
 * 
   40-Minute Keynote
   
 * 
   60-Minute Keynote
   


TRACK(S)

Select All | Clear
 * 
   AI, ML, & Data Science
   
 * 
   Application Security: Defense
   
 * 
   Application Security: Offense
   
 * 
   Cloud Security
   
 * 
   Community & Career
   
 * 
   Cryptography
   
 * 
   Cyber Insurance
   
 * 
   Cyber-Physical Systems & IoT
   
 * 
   Defense
   
 * 
   Enterprise Security
   
 * 
   Exploit Development & Vulnerability Discovery
   
 * 
   Forward Focus
   
 * 
   Hardware / Embedded
   
 * 
   Human Factors
   
 * 
   Industrial Control Systems
   
 * 
   Keynote
   
 * 
   Malware
   
 * 
   Mobile
   
 * 
   Network Security
   
 * 
   Platform Security
   
 * 
   Policy
   
 * 
   Privacy
   
 * 
   Reverse Engineering
   
 * 
   Threat Hunting & Incident Response
   

No sessions found

 * * Wednesday | 8:00am
   * Briefings Breakfast
     Location:  TBD
     
     Track:
     
     Location: Michelob ULTRA Arena
     
     
      LATE
     
     
     
     
     
     
     
   
   * Wednesday | 9:00am
   * Keynote: Democracy's Biggest Year: The Fight for Secure Elections Around
     the World
     Location:  TBD
     Panelist: Jen Easterly, Panelist: Hans de Vries, Panelist: Felicity Oswald
     OBE, Moderator: Christina A. Cassidy
     Track:
     
     Keynote
     Format: 60-Minute Keynote
     Location: Michelob ULTRA Arena
     
     
      LATE
     
     
     
     
     
     
     
   
   * Wednesday | 10:20am
   * Arbitrary Data Manipulation and Leakage with CPU Zero-Day Bugs on RISC-V
     Location:  TBD
     Speaker: Fabian Thomas, Contributor: Ruiyi Zhang, Speaker: Lorenz
     Hetterich, Contributor: Michael Schwarz
     Tracks:
     
     Hardware / Embedded,
     
     Exploit Development & Vulnerability Discovery
     Format: 40-Minute Briefings
     Location: South Seas AB, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Breaching AWS Accounts Through Shadow Resources
     Location:  TBD
     Speaker: Yakir Kadkoda, Speaker: Michael Katchinskiy, Speaker: Ofek Itach
     Tracks:
     
     Cloud Security,
     
     Enterprise Security
     Format: 40-Minute Briefings
     Location: South Pacific F, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Fallen Tower of Babel: Rooting Wireless Mesh Networks by Abusing
     Heterogeneous Control Protocols
     Location:  TBD
     Speaker: Xin'an Zhou, Speaker: Zhiyun Qian, Contributor: Juefei Pu,
     Contributor: Qing Deng, Contributor: Srikanth Krishnamurthy, Contributor:
     Keyu Man
     Tracks:
     
     Cryptography,
     
     Network Security
     Format: 40-Minute Briefings
     Location: Islander EI, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Let the Cache Cache and Let the WebAssembly Assemble: Knockin' on Chrome's
     Shell
     Location:  TBD
     Speaker: Edouard Bochin, Speaker: Tao Yan, Contributor: Bo Qu
     Tracks:
     
     Exploit Development & Vulnerability Discovery,
     
     Application Security: Offense
     Format: 40-Minute Briefings
     Location: South Seas CD, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Listen to the Whispers: Web Timing Attacks that Actually Work
     Location:  TBD
     Speaker: James Kettle
     Tracks:
     
     Application Security: Offense,
     
     Reverse Engineering
     Format: 40-Minute Briefings
     Location: Jasmine AE, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     POLICY TRACK MEETUP
     Location:  TBD
     Moderator: Jason Healey
     Track:
     
     Policy
     Format: 40-Minute Briefings
     Location: Breakers C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Practical LLM Security: Takeaways From a Year in the Trenches
     Location:  TBD
     Speaker: Richard Harang
     Track:
     
     AI, ML, & Data Science
     Format: 40-Minute Briefings
     Location: Mandalay Bay H, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Project 0xA11C: Deoxidizing the Rust Malware Ecosystem
     Location:  TBD
     Speaker: Nicole Fishbein, Speaker: Juan Andrés Guerrero-Saade
     Tracks:
     
     Reverse Engineering,
     
     Malware
     Format: 40-Minute Briefings
     Location: Oceanside C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Tunnel Vision: Exploring VPN Post-Exploitation Techniques
     Location:  TBD
     Speaker: Ori David
     Tracks:
     
     Network Security,
     
     Enterprise Security
     Format: 40-Minute Briefings
     Location: Islander FG, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Windows Downdate: Downgrade Attacks Using Windows Updates
     Location:  TBD
     Speaker: Alon Leviev
     Tracks:
     
     Platform Security,
     
     Malware
     Format: 40-Minute Briefings
     Location: Oceanside A, Level 2
     
     
      LATE
     
     
     
     
     
     
     
   
   * Wednesday | 11:00am
   * Briefings Refreshment Break
     Location:  TBD
     
     Track:
     
     Location: Outside Briefings Rooms (Levels 0, 2, & 3)
     
     
      LATE
     
     
     
     
     
     
     
   
   * Wednesday | 11:20am
   * 15 Ways to Break Your Copilot
     Location:  TBD
     Speaker: Michael Bargury, Contributor: Avishai Efrati
     Tracks:
     
     Application Security: Defense,
     
     Enterprise Security
     Format: 40-Minute Briefings
     Location: Mandalay Bay H, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     A Framework for Evaluating National Cybersecurity Strategies
     Location:  TBD
     Speaker: Fred Heiding, Contributor: Alex O'Neill, Contributor: Lachlan
     Price, Contributor: Eric Rosenbach
     Tracks:
     
     Policy,
     
     Defense
     Format: 40-Minute Briefings
     Location: Jasmine AE, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     AI TRACK MEETUP
     Location:  TBD
     Moderator: Nathan Hamiel
     Track:
     
     AI, ML, & Data Science
     Format: 40-Minute Briefings
     Location: Breakers C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     All Your Secrets Belong to Us: Leveraging Firmware Bugs to Break TEEs
     Location:  TBD
     Speaker: Tom Dohrmann
     Tracks:
     
     Platform Security,
     
     Hardware / Embedded
     Format: 40-Minute Briefings
     Location: South Pacific F, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Bugs of Yore: A Bug Hunting Journey on VMware's Hypervisor
     Location:  TBD
     Speaker: Zisis Sialveras
     Tracks:
     
     Exploit Development & Vulnerability Discovery,
     
     Reverse Engineering
     Format: 40-Minute Briefings
     Location: Islander EI, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     From Exploits to Forensics Evidence - Unraveling the Unitronics Attack
     Location:  TBD
     Speaker: Noam Moshe
     Tracks:
     
     Threat Hunting & Incident Response,
     
     Cyber-Physical Systems & IoT
     Format: 40-Minute Briefings
     Location: Oceanside C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Hardening HSMs for Banking-Grade Crypto Wallets
     Location:  TBD
     Speaker: Jean-Philippe Aumasson, Speaker: Chervine Majeri
     Tracks:
     
     Cryptography,
     
     Hardware / Embedded
     Format: 40-Minute Briefings
     Location: Islander FG, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Low Energy to High Energy: Hacking Nearby EV-Chargers Over Bluetooth
     Location:  TBD
     Speaker: Thijs Alkemade, Speaker: Khaled Nassar, Contributor: Daan Keuper
     Tracks:
     
     Cyber-Physical Systems & IoT,
     
     Exploit Development & Vulnerability Discovery
     Format: 40-Minute Briefings
     Location: South Seas CD, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Project Zero: Ten Years of 'Make 0-Day Hard'
     Location:  TBD
     Speaker: Natalie Silvanovich
     Tracks:
     
     Defense,
     
     Exploit Development & Vulnerability Discovery
     Format: 40-Minute Briefings
     Location: Oceanside A, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     We R in a Right Pickle With All These Insecure Serialization Formats
     Location:  TBD
     Speaker: Kasimir Schulz, Speaker: Tom Bonner
     Tracks:
     
     Reverse Engineering,
     
     Application Security: Offense
     Format: 40-Minute Briefings
     Location: South Seas AB, Level 3
     
     
      LATE
     
     
     
     
     
     
     
   
   * Wednesday | 12:00pm
   * Briefings Lunch
     Location:  TBD
     
     Track:
     
     Location: Bayside D, Level 1
     
     
      LATE
     
     
     
     
     
     
     
   
   * Wednesday | 12:15pm
   * Main Stage: From the Office of the CISO: Smarter, Faster, Stronger Security
     in the Age of AI
     Location:  TBD
     Speaker: Ann Johnson, Speaker: Sherrod DeGrippo
     Track:
     
     Keynote
     Format: 25-Minute Keynote
     Location: Oceanside A, Level 2
     
     
     
      LATE
     
     
     
     
     
     
     
   
   * Wednesday | 12:40pm
   * Main Stage: Understanding and Reducing Supply Chain and Software
     Vulnerability Risks
     Location:  TBD
     Speaker: Danny Jenkins
     Track:
     
     Keynote
     Format: 25-Minute Keynote
     Location: Oceanside A, Level 2
     
     
      LATE
     
     
     
     
     
     
     
   
   * Wednesday | 1:30pm
   * From HAL to HALT: Thwarting Skynet's Siblings in the GenAI Coding Era
     Location:  TBD
     Speaker: Chris Wysopal
     Tracks:
     
     Application Security: Defense,
     
     AI, ML, & Data Science
     Format: 40-Minute Briefings
     Location: Oceanside A, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Modern Kill Chains: Real World SaaS Attacks and Mitigation Strategies
     Location:  TBD
     Speaker: Cory Michal, Speaker: Brandon Levene, Speaker: Ben Pruce
     Tracks:
     
     Threat Hunting & Incident Response,
     
     Enterprise Security
     Format: 40-Minute Briefings
     Location: South Seas CD, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Predict, Prioritize, Patch: How Microsoft Harnesses LLMs for Security
     Response
     Location:  TBD
     Speaker: Bill Demirkapi
     Tracks:
     
     AI, ML, & Data Science,
     
     Application Security: Defense
     Format: 40-Minute Briefings
     Location: Oceanside C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     REVERSE ENGINEERING TRACK MEETUP
     Location:  TBD
     Moderator: Marion Marschalek
     Track:
     
     Reverse Engineering
     Format: 40-Minute Briefings
     Location: Breakers C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Self-Hosted GitHub CI/CD Runners: Continuous Integration, Continuous
     Destruction
     Location:  TBD
     Speaker: Adnan Khan, Speaker: John Stawinski
     Tracks:
     
     Enterprise Security,
     
     Application Security: Offense
     Format: 40-Minute Briefings
     Location: South Seas AB, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Splitting the Email Atom: Exploiting Parsers to Bypass Access Controls
     Location:  TBD
     Speaker: Gareth Heyes
     Tracks:
     
     Application Security: Offense,
     
     Enterprise Security
     Format: 40-Minute Briefings
     Location: Mandalay Bay H, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     The Fundamentals of Cyber-Insurance
     Location:  TBD
     Speaker: Tiago Henriques
     Track:
     
     Cyber Insurance
     Format: 40-Minute Briefings
     Location: Oceanside D, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     The GCP Jenga Tower: Hacking Millions of Google's Servers With a Single
     Package (and more)
     Location:  TBD
     Speaker: Liv Matan
     Tracks:
     
     Cloud Security,
     
     Application Security: Offense
     Format: 40-Minute Briefings
     Location: South Pacific F, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     The Hack@DAC Story: Learnings from Organizing the World's Largest Hardware
     Hacking Competition
     Location:  TBD
     Speaker: Arun Kanuparthi, Speaker: Hareesh Khattri, Contributor: Jason
     Fung, Contributor: Jeyavijayan JV Rajendran, Contributor: Ahmad-Reza
     Sadeghi
     Tracks:
     
     Community & Career,
     
     Hardware / Embedded
     Format: 40-Minute Briefings
     Location: Jasmine AE, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     The Overlooked Attack Surface: Diving into Windows Client Components for
     RCE Vulnerabilities
     Location:  TBD
     Speaker: Qinghe Xie, Speaker: Fangming Gu, Speaker: Zong Cao, Contributor:
     Qingli Guo
     Tracks:
     
     Exploit Development & Vulnerability Discovery,
     
     Network Security
     Format: 40-Minute Briefings
     Location: Islander EI, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Unraveling the Mind Behind the APT - Analyzing the Role of Pretexting in
     CTI and Attribution
     Location:  TBD
     Speaker: Sanne Maasakkers
     Tracks:
     
     Human Factors,
     
     Threat Hunting & Incident Response
     Format: 40-Minute Briefings
     Location: Islander FG, Level 0
     
     
      LATE
     
     
     
     
     
     
     
   
   * Wednesday | 2:30pm
   * Cracking the 5G Fortress: Peering Into 5G's Vulnerability Abyss
     Location:  TBD
     Speaker: Kai Tu, Speaker: Yilu Dong, Contributor: Abdullah Al Ishtiaq,
     Contributor: Syed Md Mukit Rashid, Contributor: Weixuan Wang, Contributor:
     Tianwei Wu, Contributor: Syed Rafiul Hussain
     Tracks:
     
     Mobile,
     
     Exploit Development & Vulnerability Discovery
     Format: 30-Minute Briefings
     Location: Oceanside C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Deep Backdoors in Deep Reinforcement Learning Agents
     Location:  TBD
     Speaker: Vasilios Mavroudis, Speaker: Jamie Gawith, Contributor: Sañyam
     Vyas, Contributor: Chris Hicks
     Tracks:
     
     AI, ML, & Data Science,
     
     Cyber-Physical Systems & IoT
     Format: 30-Minute Briefings
     Location: South Seas AB, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Foreign Information Manipulation and Interference (Disinformation 2.0)
     Based on Learnings from 30 Years at NATO
     Location:  TBD
     Speaker: Franky Saegerman
     Tracks:
     
     Defense,
     
     Human Factors
     Format: 30-Minute Briefings
     Location: Jasmine AE, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities
     for Initial Access
     Location:  TBD
     Speaker: Nick Frichette
     Track:
     
     Cloud Security
     Format: 30-Minute Briefings
     Location: Mandalay Bay H, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Ops! It is JTAG's Fault: Journey to Unlocking Automotive Grade IC
     Location:  TBD
     Speaker: Jun Li, Contributor: Zhongjie Wu, Contributor: Yuqiao Yang,
     Contributor: WenHao Liu, Contributor: Ruicong Shi, Contributor: YuQiao
     Ning, Contributor: Wu Chao, Contributor: Harry Guo, Contributor: Kun Yang,
     Contributor: Xiaohang Wang, Contributor: Kui Ren, Contributor: Ting Chen
     Tracks:
     
     Hardware / Embedded,
     
     Cyber-Physical Systems & IoT
     Format: 30-Minute Briefings
     Location: Islander EI, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     PyLingual: A Python Decompilation Framework for Evolving Python Versions
     Location:  TBD
     Speaker: Josh Wiedemeier, Contributor: Elliot Tarbet, Contributor: Max
     Zheng, Contributor: Jerry Teng, Contributor: Ximeng Liu, Contributor:
     Muhyun Kim, Contributor: Sang Kil Cha, Contributor: Jessica Ouyang,
     Contributor: Kangkook Jee
     Track:
     
     Reverse Engineering
     Format: 30-Minute Briefings
     Location: Oceanside A, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Relationships Matter: Reconstructing the Organizational and Social
     Structure of a Ransomware Gang
     Location:  TBD
     Speaker: Dalya Manatova, Speaker: L Jean Camp
     Track:
     
     Human Factors
     Format: 30-Minute Briefings
     Location: Islander FG, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Strengthen Cyber-security by Leveraging Cyber-Insurance
     Location:  TBD
     Speaker: Bridget Q. Choi
     Track:
     
     Cyber Insurance
     Format: 30-Minute Briefings
     Location: Oceanside D, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Surveilling the Masses with Wi-Fi Positioning Systems
     Location:  TBD
     Speaker: Erik Rye
     Tracks:
     
     Privacy,
     
     Network Security
     Format: 30-Minute Briefings
     Location: South Seas CD, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     TuDoor Attack: Systematically Exploring and Exploiting Logic
     Vulnerabilities in DNS Response Pre-processing with Malformed Packets
     Location:  TBD
     Speaker: Qi Wang, Contributor: Xiang Li, Contributor: Chuhan Wang
     Track:
     
     Network Security
     Format: 30-Minute Briefings
     Location: South Pacific F, Level 0
     
     
      LATE
     
     
     
     
     
     
     
   
   * Wednesday | 3:00pm
   * Briefings Refreshment Break
     Location:  TBD
     
     Track:
     
     Location: Outside Briefings Rooms (Levels 0, 2, & 3)
     
     
      LATE
     
     
     
     
     
     
     
   
   * Wednesday | 3:20pm
   * AI Safety and You: Perspectives on Evolving Risks and Impacts
     Location:  TBD
     Moderator: Nathan Hamiel, Panelist: Amanda Minnich, Panelist: Nikki Pope,
     Panelist: Mikel Rodriguez
     Tracks:
     
     Forward Focus,
     
     AI, ML, & Data Science
     Format: 40-Minute Briefings
     Location: Oceanside A, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Attacking Samsung Galaxy A* Boot Chain, and Beyond
     Location:  TBD
     Speaker: Maxime Rossi Bellom, Speaker: Raphael Neveu, Contributor: Damiano
     Melotti, Contributor: Gabrielle Viala
     Tracks:
     
     Mobile,
     
     Exploit Development & Vulnerability Discovery
     Format: 40-Minute Briefings
     Location: South Seas AB, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Compromising Confidential Compute, One Bug at a Time
     Location:  TBD
     Speaker: Maxime Villard, Contributor: Yair Netzer, Contributor: Ben Hania
     Tracks:
     
     Cloud Security,
     
     Exploit Development & Vulnerability Discovery
     Format: 40-Minute Briefings
     Location: Mandalay Bay H, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Cyber Claims Outlook 2024: Trends, Threats, and Tomorrow's Challenges
     Location:  TBD
     Speaker: Catherine Lyle
     Track:
     
     Cyber Insurance
     Format: 40-Minute Briefings
     Location: Oceanside D, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     HARDWARE/EMBEDDED TRACK MEETUP
     Location:  TBD
     Moderator: Daniel Cuthbert
     Track:
     
     Hardware / Embedded
     Format: 40-Minute Briefings
     Location: Breakers C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Into the Inbox: Novel Email Spoofing Attack Patterns
     Location:  TBD
     Speaker: Hao Wang, Speaker: Caleb Sargent, Contributor: Harrison Pomeroy,
     Contributor: Renana Friedlich
     Tracks:
     
     Enterprise Security,
     
     Exploit Development & Vulnerability Discovery
     Format: 40-Minute Briefings
     Location: Islander FG, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     MaLDAPtive: Diving Deep Into LDAP Obfuscation, Deobfuscation & Detection
     Location:  TBD
     Speaker: Daniel Bohannon, Speaker: Sabajete Elezaj
     Tracks:
     
     Malware,
     
     Defense
     Format: 40-Minute Briefings
     Location: Oceanside C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Secure Shells in Shambles
     Location:  TBD
     Speaker: HD Moore, Speaker: Rob King
     Tracks:
     
     Application Security: Offense,
     
     Exploit Development & Vulnerability Discovery
     Format: 40-Minute Briefings
     Location: South Pacific F, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Skirting the Tornado: Essential Strategies for CISOs to Sidestep Government
     Fallout in the Wake of Major Cyberattacks
     Location:  TBD
     Speaker: Jess Nall
     Tracks:
     
     Community & Career,
     
     Defense
     Format: 40-Minute Briefings
     Location: Jasmine AE, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Super Hat Trick: Exploit Chrome and Firefox Four Times
     Location:  TBD
     Speaker: Nan Wang, Speaker: Zhenghang Xiao, Contributor: Xuehao Guo,
     Contributor: Qinrun Dai
     Tracks:
     
     Exploit Development & Vulnerability Discovery,
     
     Platform Security
     Format: 40-Minute Briefings
     Location: South Seas CD, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     That Gambling Site? It's Fueled by Chinese Organized Crime
     Location:  TBD
     Speaker: Maël Le Touz, Speaker: Renée Burton
     Tracks:
     
     Threat Hunting & Incident Response,
     
     Human Factors
     Format: 40-Minute Briefings
     Location: Islander EI, Level 0
     
     
      LATE
     
     
     
     
     
     
     
   
   * Wednesday | 4:20pm
   * Achilles' Heel of JS Engines: Exploiting Modern Browsers During WASM
     Execution
     Location:  TBD
     Contributor: Bohan Liu, Speaker: Zong Cao, Speaker: Zheng Wang,
     Contributor: Yeqi Fu, Contributor: Cen Zhang
     Tracks:
     
     Exploit Development & Vulnerability Discovery,
     
     Mobile
     Format: 40-Minute Briefings
     Location: South Seas CD, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     From Doxing to Doorstep: Exposing Privacy Intrusion Techniques used by
     Hackers for Extortion
     Location:  TBD
     Speaker: Jacob Larsen
     Track:
     
     Privacy
     Format: 40-Minute Briefings
     Location: Jasmine AE, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Is Defense Winning?
     Location:  TBD
     Speaker: Jason Healey
     Track:
     
     Policy
     Format: 40-Minute Briefings
     Location: Oceanside A, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Isolation or Hallucination? Hacking AI Infrastructure Providers for Fun and
     Weights
     Location:  TBD
     Speaker: Hillai Ben-Sasson, Speaker: Sagi Tzadik
     Tracks:
     
     AI, ML, & Data Science,
     
     Cloud Security
     Format: 40-Minute Briefings
     Location: Islander EI, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Moral Hazards and Ethical Considerations in Cyber-Insurance
     Location:  TBD
     Speaker: Lindsay Nickle, Speaker: Tiago Henriques, Speaker: Scott Stransky
     Track:
     
     Cyber Insurance
     Format: 40-Minute Briefings
     Location: Oceanside D, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Nope, S7ill Not Secure: Stealing Private Keys From S7 PLCs
     Location:  TBD
     Speaker: Nadav Adir, Speaker: Alon Dankner, Contributor: Eli Biham,
     Contributor: Sara Bitan, Contributor: Ron Freudenthal, Contributor: Or
     Keret
     Tracks:
     
     Cyber-Physical Systems & IoT,
     
     Cryptography
     Format: 40-Minute Briefings
     Location: South Seas AB, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     SnailLoad: Anyone on the Internet Can Learn What You're Doing
     Location:  TBD
     Speaker: Daniel Gruss, Speaker: Stefan Gast
     Tracks:
     
     Network Security,
     
     Exploit Development & Vulnerability Discovery
     Format: 40-Minute Briefings
     Location: Oceanside C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Surfacing a Hydra: Unveiling a Multi-Headed Chinese State-Sponsored
     Campaign Against a Foreign Government
     Location:  TBD
     Speaker: Morgan Demboski, Speaker: Mark Parsons
     Tracks:
     
     Threat Hunting & Incident Response,
     
     Defense
     Format: 40-Minute Briefings
     Location: South Pacific F, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     The Way to Android Root: Exploiting Your GPU on Smartphone
     Location:  TBD
     Speaker: Xiling Gong, Speaker: Xuan Xing, Contributor: Eugene Rodionov
     Tracks:
     
     Mobile,
     
     Exploit Development & Vulnerability Discovery
     Format: 40-Minute Briefings
     Location: Mandalay Bay H, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     UnOAuthorized: A Technique to Privilege Escalation to Global Administrator
     Location:  TBD
     Speaker: Eric Woodruff
     Tracks:
     
     Cloud Security,
     
     Enterprise Security
     Format: 40-Minute Briefings
     Location: Islander FG, Level 0
     
     
      LATE
     
     
     
     
     
     
     
   
   * Thursday | 8:00am
   * Briefings Breakfast
     Location:  TBD
     
     Track:
     
     Location: Michelob ULTRA Arena
     
     
      LATE
     
     
     
     
     
     
     
   
   * Thursday | 9:00am
   * Keynote: Fireside Chat with Moxie Marlinspike
     Location:  TBD
     Speaker: Moxie Marlinspike, Speaker: Jeff Moss
     Track:
     
     Keynote
     Format: 60-Minute Keynote
     Location: Michelob ULTRA Arena
     
     
      LATE
     
     
     
     
     
     
     
   
   * Thursday | 10:20am
   * ACE Up the Sleeve: Hacking Into Apple's New USB-C Controller
     Location:  TBD
     Speaker: Thomas Roth
     Tracks:
     
     Hardware / Embedded,
     
     Mobile
     Format: 40-Minute Briefings
     Location: South Pacific F, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Driving Forces Behind Industry 4.0 and Digital Transformation for Critical
     Infrastructure
     Location:  TBD
     Speaker: Emma Stewart
     Track:
     
     Industrial Control Systems
     Format: 40-Minute Briefings
     Location: Oceanside D, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     From Weapon to Target: Quantum Computers Paradox
     Location:  TBD
     Speaker: Adrian Coleșa, Speaker: Sorin Boloș
     Track:
     
     Platform Security
     Format: 40-Minute Briefings
     Location: South Seas CD, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Gotta Cache Em All: Bending the Rules of Web Cache Exploitation
     Location:  TBD
     Speaker: Martin Doyhenard
     Tracks:
     
     Application Security: Offense,
     
     Cloud Security
     Format: 40-Minute Briefings
     Location: Mandalay Bay H, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     How Hackers Changed the Media (and the Media Changed Hackers)
     Location:  TBD
     Moderator: Sherri Davidoff, Panelist: Lorenzo Franceschi-Bicchierai,
     Panelist: Robert McMillan, Panelist: Sadia Mirza
     Track:
     
     Community & Career
     Format: 40-Minute Briefings
     Location: Oceanside A, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     In Defense of Facts: Setting Standards Against Information Threats
     Location:  TBD
     Speaker: Lester Godsey
     Tracks:
     
     Human Factors,
     
     Threat Hunting & Incident Response
     Format: 40-Minute Briefings
     Location: Jasmine AE, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     OVPNX: 4 Zero-Days Leading to RCE, LPE and KCE (via BYOVD) Affecting
     Millions of OpenVPN Endpoints Across the Globe
     Location:  TBD
     Speaker: Vladimir Tokarev
     Tracks:
     
     Exploit Development & Vulnerability Discovery,
     
     Application Security: Offense
     Format: 40-Minute Briefings
     Location: South Seas AB, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     POLICY MEETUP - National Policy and Security: Impact of Emerging Technology
     and Threats
     Location:  TBD
     Moderator: Jason Healey, Panelist: Nand Mulchandani, Panelist: Hans de
     Vries, Panelist: Lauryn Williams, Panelist: Amit Elazari
     Track:
     
     Policy
     Format: 40-Minute Briefings
     Location: Breakers C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Reinforcement Learning for Autonomous Resilient Cyber Defense
     Location:  TBD
     Speaker: Sara Farmer, Contributor: David Foster, Contributor: James Short,
     Contributor: Dr Andy Harrison FORS, Speaker: Ian Miles, Contributor:
     Matthew Lacey, Contributor: Chris Willis, Contributor: Daniel Harrold,
     Contributor: Chris Parry, Contributor: Gregory Palmer, Contributor: John H,
     Contributor: Tom Wilson, Contributor: Ryan Heartfield, Contributor: Mark
     Dorn, Contributor: Demian Till, Contributor: David Rimmer, Contributor:
     Samuel Bailey, Contributor: Peter Haubrick, Contributor: Jack Stone,
     Contributor: Madeline Cheah, Contributor: Pedro Marques, Contributor: Alfie
     Beard, Contributor: Jonathan Francis Roscoe, Contributor: Alec Wilson,
     Contributor: Ryan Menzies, Contributor: Marco Casassa Mont, Contributor:
     Neela Morarji, Contributor: Lisa Gralewski, Contributor: Esin Turkbeyler
     Tracks:
     
     AI, ML, & Data Science,
     
     Defense
     Format: 40-Minute Briefings
     Location: Islander EI, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Stop! Sandboxing Exploitable Functions and Modules Using In-Kernel Machine
     Learning
     Location:  TBD
     Speaker: Qinrun Dai, Contributor: Tiejin Chen, Contributor: Zicheng Wang,
     Contributor: Hua Wei, Contributor: Yueqi Chen
     Tracks:
     
     Defense,
     
     AI, ML, & Data Science
     Format: 40-Minute Briefings
     Location: Islander FG, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Swipe Left for Identity Theft: An Analysis of User Data Privacy Risks on
     Location-based Dating Apps
     Location:  TBD
     Speaker: Karel Dhondt, Speaker: Victor Le Pochat
     Tracks:
     
     Privacy,
     
     Mobile
     Format: 40-Minute Briefings
     Location: Oceanside C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
   
   * Thursday | 11:00am
   * Briefings Refreshment Break
     Location:  TBD
     
     Track:
     
     Location: Outside Briefings Rooms (Levels 0, 2, & 3)
     
     
      LATE
     
     
     
     
     
     
     
   
   * Thursday | 11:20am
   * Flipping Bits: Your Credentials Are Certainly Mine
     Location:  TBD
     Speaker: STÖK STÖK, Speaker: Joona Hoikkala
     Tracks:
     
     Application Security: Offense,
     
     Exploit Development & Vulnerability Discovery
     Format: 40-Minute Briefings
     Location: Oceanside A, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     From MLOps to MLOops - Exposing the Attack Surface of Machine Learning
     Platforms
     Location:  TBD
     Speaker: Shachar Menashe
     Tracks:
     
     AI, ML, & Data Science,
     
     Platform Security
     Format: 40-Minute Briefings
     Location: South Seas AB, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Laser Beams & Light Streams: Letting Hackers Go Pew Pew, Building
     Affordable Light-Based Hardware Security Tooling
     Location:  TBD
     Speaker: Sam Beaumont, Speaker: Larry Trowell
     Tracks:
     
     Hardware / Embedded,
     
     Exploit Development & Vulnerability Discovery
     Format: 40-Minute Briefings
     Location: Islander EI, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Listen Up: Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap
     Location:  TBD
     Speaker: Alex Plaskett, Speaker: Robert Herrera
     Tracks:
     
     Cyber-Physical Systems & IoT,
     
     Hardware / Embedded
     Format: 40-Minute Briefings
     Location: South Pacific F, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Living off Microsoft Copilot
     Location:  TBD
     Speaker: Michael Bargury, Contributor: Tamir Ishay Sharbat, Contributor:
     Gal Malka, Contributor: Lana Salameh
     Tracks:
     
     Enterprise Security,
     
     Cloud Security
     Format: 40-Minute Briefings
     Location: Mandalay Bay H, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Modern Anti-Abuse Mechanisms in Competitive Video Games
     Location:  TBD
     Speaker: Julien Voisin
     Tracks:
     
     Defense,
     
     Human Factors
     Format: 40-Minute Briefings
     Location: Jasmine AE, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Navigating the Complex Challenges of Setting Up Efficient and Robust OT SOC
     Capabilities
     Location:  TBD
     Speaker: Piotr Ciepiela
     Track:
     
     Industrial Control Systems
     Format: 40-Minute Briefings
     Location: Oceanside D, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Overcoming State: Finding Baseband Vulnerabilities by Fuzzing Layer-2
     Location:  TBD
     Speaker: Dyon Goos, Speaker: Marius Muench
     Tracks:
     
     Mobile,
     
     Hardware / Embedded
     Format: 40-Minute Briefings
     Location: Oceanside C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Terrapin Attack: Breaking SSH Channel Integrity by Sequence Number
     Manipulation
     Location:  TBD
     Speaker: Fabian Bäumer
     Tracks:
     
     Cryptography,
     
     Application Security: Offense
     Format: 40-Minute Briefings
     Location: Islander FG, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     You've Already Been Hacked: What if There Is a Backdoor in Your UEFI OROM?
     Location:  TBD
     Speaker: Kazuki Matsuo
     Tracks:
     
     Malware,
     
     Platform Security
     Format: 40-Minute Briefings
     Location: South Seas CD, Level 3
     
     
      LATE
     
     
     
     
     
     
     
   
   * Thursday | 12:00pm
   * Briefings Lunch
     Location:  TBD
     
     Track:
     
     Location: Bayside D, Level 1
     
     
      LATE
     
     
     
     
     
     
     
   
   * Thursday | 12:15pm
   * Main Stage: Let Me Tell You a Story: Technology and the 4 Vs
     Location:  TBD
     Speaker: Jen Easterly
     Track:
     
     Keynote
     Format: 25-Minute Keynote
     Location: Oceanside A, Level 2
     
     
      LATE
     
     
     
     
     
     
     
   
   * Thursday | 12:40pm
   * Main Stage: Solving the Cyber Hard Problems: A View into Problem Solving
     from the White House
     Location:  TBD
     Speaker: Harry Coker, Moderator: Steven Kelly
     Track:
     
     Keynote
     Format: 25-Minute Keynote
     Location: Oceanside A, Level 2
     
     
      LATE
     
     
     
     
     
     
     
   
   * Thursday | 1:30pm
   * Bytecode Jiu-Jitsu: Choking Interpreters to Force Execution of Malicious
     Bytecode
     Location:  TBD
     Speaker: Toshinori Usui, Speaker: Yuto Otsuki, Contributor: Ryo Kubota,
     Contributor: Yuhei Kawakoya, Contributor: Makoto Iwamura, Contributor:
     Kanta Matsuura
     Tracks:
     
     Malware,
     
     Reverse Engineering
     Format: 40-Minute Briefings
     Location: South Seas AB, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP
     Server! (PRE-RECORDED)
     Location:  TBD
     Speaker: Orange Tsai
     Tracks:
     
     Application Security: Offense,
     
     Exploit Development & Vulnerability Discovery
     Format: 40-Minute Briefings
     Location: Islander FG, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     ICS Risk Management: Strategies for Assessing and Mitigating Operational,
     Safety, Financial, and Cybersecurity Risks
     Location:  TBD
     Moderator: Daniel Cuthbert, Panelist: Thomas Brandstetter, Panelist: Noam
     Moshe, Panelist: Cassie Crossley
     Track:
     
     Industrial Control Systems
     Format: 40-Minute Briefings
     Location: Oceanside D, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Locked Down but Not Out: Fighting the Hidden War in Your Bootloader
     Location:  TBD
     Speaker: Bill Demirkapi
     Tracks:
     
     Defense,
     
     Platform Security
     Format: 40-Minute Briefings
     Location: Oceanside A, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     MOBILE TRACK MEETUP
     Location:  TBD
     Moderator: Stephanie Domas
     Track:
     
     Mobile
     Format: 40-Minute Briefings
     Location: Breakers C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     One Hack to Rule Them All: Pervasive Account Takeovers in Integration
     Platforms for Workflow Automation, Virtual Voice Assistant, IoT, & LLM
     Services
     Location:  TBD
     Speaker: Kaixuan Luo, Speaker: Xianbo Wang, Contributor: Adonis Fung,
     Contributor: Julien Lecomte, Contributor: Wing Cheong Lau
     Tracks:
     
     Cloud Security,
     
     Application Security: Offense
     Format: 40-Minute Briefings
     Location: South Seas CD, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Quantum Security: Myths, Facts, and Realities
     Location:  TBD
     Panelist: Jean-Philippe Aumasson, Panelist: Mark Carney, Panelist: Tommaso
     Gagliardoni, Moderator: Nathan Hamiel
     Tracks:
     
     Forward Focus,
     
     Cryptography
     Format: 40-Minute Briefings
     Location: South Pacific F, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Securing Network Appliances: New Technologies and Old Challenges
     Location:  TBD
     Speaker: Vladyslav Babkin
     Tracks:
     
     Enterprise Security,
     
     Network Security
     Format: 40-Minute Briefings
     Location: Jasmine AE, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     The Hidden Treasure of Crash Reports?
     Location:  TBD
     Speaker: Patrick Wardle
     Tracks:
     
     Threat Hunting & Incident Response,
     
     Exploit Development & Vulnerability Discovery
     Format: 40-Minute Briefings
     Location: Mandalay Bay H, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Uncovering Supply Chain Attack with Code Genome Framework
     Location:  TBD
     Speaker: Dhilung Kirat, Speaker: Jiyong Jang
     Track:
     
     Application Security: Defense
     Format: 40-Minute Briefings
     Location: Islander EI, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     What Lies Beneath the Surface? Evaluating LLMs for Offensive Cyber
     Capabilities through Prompting, Simulation & Emulation
     Location:  TBD
     Speaker: Michael Kouremetis, Speaker: Marissa Dotter, Speaker: Alex Byrne,
     Contributor: Dan Martin, Contributor: Ethan Michalak, Contributor:
     Gianpaolo Russo, Contributor: Michael Threet
     Tracks:
     
     AI, ML, & Data Science,
     
     Defense
     Format: 40-Minute Briefings
     Location: Oceanside C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
   
   * Thursday | 2:30pm
   * Becoming Cybersecurity Bilingual: Effective Communication for Hackers
     Location:  TBD
     Speaker: John Dwyer
     Track:
     
     Community & Career
     Format: 30-Minute Briefings
     Location: Islander FG, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Break the Wall from Bottom: Automated Discovery of Protocol-Level Evasion
     Vulnerabilities in Web Application Firewalls
     Location:  TBD
     Speaker: Qi Wang, Contributor: Jianjun Chen, Contributor: Run Guo,
     Contributor: Chao Zhang, Contributor: Haixin Duan
     Tracks:
     
     Application Security: Offense,
     
     Cloud Security
     Format: 30-Minute Briefings
     Location: South Pacific F, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Bypassing ARM's Memory Tagging Extension with a Side-Channel Attack
     Location:  TBD
     Speaker: Juhee Kim, Contributor: Jinbum Park, Contributor: Sihyeon Roh,
     Contributor: Jaeyoung Chung, Contributor: Youngjoo Lee, Contributor: Taesoo
     Kim, Contributor: Byoungyoung Lee
     Tracks:
     
     Hardware / Embedded,
     
     Exploit Development & Vulnerability Discovery
     Format: 30-Minute Briefings
     Location: Oceanside A, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     CANCELLED: Unmasking Privacy Risks in Post-Cookie Adtech Solutions
     Location:  TBD
     Speaker: Narayana Pappu
     Tracks:
     
     Privacy,
     
     AI, ML, & Data Science
     Format: 30-Minute Briefings
     Location: Islander FG, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Crashing the Party: Vulnerabilities in RPKI Validation
     Location:  TBD
     Speaker: Niklas Vogel, Speaker: Donika Mirdita, Contributor: Haya
     Schulmann, Contributor: Michael Waidner
     Tracks:
     
     Network Security,
     
     Application Security: Offense
     Format: 30-Minute Briefings
     Location: Islander EI, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     CYBER-PHYSICAL SYSTEMS & IOT TRACK MEETUP
     Location:  TBD
     Moderator: Stefano Zanero
     Track:
     
     Cyber-Physical Systems & IoT
     Format: 30-Minute Briefings
     Location: Breakers C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Hook, Line and Sinker: Phishing Windows Hello for Business
     Location:  TBD
     Speaker: Yehuda Smirnov
     Tracks:
     
     Enterprise Security,
     
     Cloud Security
     Format: 30-Minute Briefings
     Location: South Seas CD, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     PageJack: A Powerful Exploit Technique With Page-Level UAF
     Location:  TBD
     Speaker: Zhiyun Qian, Contributor: Jiayi Hu, Contributor: Jinmeng Zhou,
     Contributor: Qi Tang, Contributor: Wenbo Shen
     Track:
     
     Exploit Development & Vulnerability Discovery
     Format: 30-Minute Briefings
     Location: South Seas AB, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Threat Hunting with LLM: From Discovering APT SAAIWC to Tracking APTs with
     AI (PRE-RECORDED)
     Location:  TBD
     Speaker: Hongfei Wang, Speaker: Dong Wu, Contributor: Yuan Gu
     Tracks:
     
     Threat Hunting & Incident Response,
     
     AI, ML, & Data Science
     Format: 30-Minute Briefings
     Location: Oceanside C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Use Your Spell Against You: Threat Prevention of Smart Contract Exploit By
     Reusing Opcode Trace
     Location:  TBD
     Speaker: Yajin Zhou
     Tracks:
     
     Defense,
     
     Application Security: Defense
     Format: 30-Minute Briefings
     Location: Mandalay Bay H, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Will We Survive the Transitive Vulnerability Locusts?
     Location:  TBD
     Speaker: Eyal Paz, Speaker: Liad Cohen
     Tracks:
     
     Application Security: Defense,
     
     Exploit Development & Vulnerability Discovery
     Format: 30-Minute Briefings
     Location: Jasmine AE, Level 3
     
     
      LATE
     
     
     
     
     
     
     
   
   * Thursday | 3:00pm
   * Briefings Refreshment Break
     Location:  TBD
     
     Track:
     
     Location: Outside Briefings Rooms (Levels 0, 2, & 3)
     
     
      LATE
     
     
     
     
     
     
     
   
   * Thursday | 3:20pm
   * Are Your Backups Still Immutable, Even Though You Can't Access Them?
     Location:  TBD
     Speaker: Ryan Kane, Speaker: Rushank Shetty
     Tracks:
     
     Enterprise Security,
     
     Application Security: Offense
     Format: 40-Minute Briefings
     Location: South Seas CD, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Attention Is All You Need for Semantics Detection: A Novel Transformer on
     Neural-Symbolic Approach
     Location:  TBD
     Speaker: Sheng-Hao Ma, Speaker: Yi-An Lin, Speaker: Mars Cheng
     Tracks:
     
     AI, ML, & Data Science,
     
     Threat Hunting & Incident Response
     Format: 40-Minute Briefings
     Location: South Seas AB, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels
     Location:  TBD
     Speaker: Vangelis Stykas
     Tracks:
     
     Threat Hunting & Incident Response,
     
     Malware
     Format: 40-Minute Briefings
     Location: South Pacific F, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Ignore Your Generative AI Safety Instructions. Violate the CFAA?
     Location:  TBD
     Speaker: Kendra Albert, Contributor: Jonathon Penney, Contributor: Ram
     Shankar Siva Kumar
     Tracks:
     
     Policy,
     
     AI, ML, & Data Science
     Format: 40-Minute Briefings
     Location: Islander FG, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     Microarchitecture Vulnerabilities: Past, Present, and Future
     Location:  TBD
     Speaker: Anders Fogh, Speaker: Daniel Gruss
     Tracks:
     
     Forward Focus,
     
     Hardware / Embedded
     Format: 40-Minute Briefings
     Location: Mandalay Bay H, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Remote, One-Click, Breaking through Smartphones via a Non Well-Known Remote
     Attack Surface
     Location:  TBD
     Contributor: Fan Yang, Contributor: Haikuo Xie, Speaker: Qinrun Dai
     Tracks:
     
     Exploit Development & Vulnerability Discovery,
     
     Application Security: Offense
     Format: 40-Minute Briefings
     Location: Islander EI, Level 0
     
     
      LATE
     
     
     
     
     
     
     
     
     The 10th Annual Black Hat USA Network Operations Center (NOC) Report
     Location:  TBD
     Speaker: Neil Wyler, Speaker: Bart Stump
     Tracks:
     
     Network Security,
     
     Application Security: Defense
     Format: 40-Minute Briefings
     Location: Oceanside A, Level 2
     
     
      LATE
     
     
     
     
     
     
     
     
     Tracing Origins: Navigating Content Authenticity in the Deepfake Era
     Location:  TBD
     Speaker: Peleus Uhley
     Tracks:
     
     Human Factors,
     
     Policy
     Format: 40-Minute Briefings
     Location: Jasmine AE, Level 3
     
     
      LATE
     
     
     
     
     
     
     
     
     Unveiling Mac Security: A Comprehensive Exploration of Sandboxing and
     AppData TCC
     Location:  TBD
     Speaker: Zhongquan Li, Speaker: Qidan He
     Tracks:
     
     Platform Security,
     
     Application Security: Offense
     Format: 40-Minute Briefings
     Location: Oceanside C, Level 2
     
     
      LATE
     
     
     
     
     
     
     
   
   * Thursday | 4:20pm
   * Locknote: Conclusions & Key Takeaways from Black Hat USA 2024
     Location:  TBD
     Panelist: Ellen Cram Kowalczyk, Moderator: Jeff Moss, Panelist: Nathan
     Hamiel, Panelist: Window Snyder, Panelist: Jos Wetzels
     Tracks:
     
     Keynote,
     
     Forward Focus
     Format: 40-Minute Keynote
     Location: Mandalay Bay H, Level 2
     
     
      LATE
     
     
     
     
     
     
     




Discover more from Informa Tech
 * Dark Reading
 * SecTor
 * Black Hat Trainings
 * Omdia

Working With Us
 * About Us
 * Code of Conduct
 * Contact us
 * Upcoming Events

Follow on Social
 * 
 * 
 * 
 * 
 * 
 * 

 * Cookie
 * CCPA: Do not sell my personal info
 * Privacy
 * Terms

Copyright © 2024 Informa PLC. Informa PLC is registered in England and Wales
with company number 8860726 whose registered and head office is 5 Howick Place,
London, SW1P 1WG.


×
>

This site uses cookies to provide you with the best user experience possible. By
continuing to use this site, you accept our use of cookies.

I Agree