Kawaiicon 2025
Join the next Kawaiicon, New Zealand’s premier hacker conference, happening November 6–8, 2025 in Wellington. This year’s edition dives deep into modern exploit techniques, particularly automated memory corruption attacks and emerging mitigation strategies in native languages and runtimes.
Why it matters for SoS‑VO:
- Brings together researchers, developers, and security professionals focused on memory safety, exploit research, and defensive programming.
- Prior sessions featured topics on “automated memory corruption exploitation,” plus insights into sandboxing and secure runtime design .
- Complementary to ongoing initiatives like NSA/CISA guidance, OpenSSF Continuum, and wasm-based secure design approaches.
What to expect:
- Talks on memory corruption tools and fuzzing—showcasing how modern exploit automation is evolving.
- Hands-on sessions and CTFs, offering practical experience with exploit development and defenses.
- Community networking with open-source maintainers, language designers, and cybersecurity experts.
This event is ideal for developers, system integrators, and security teams implementing memory-safe practices, evaluating runtime security, or building tooling for legacy-native codebases. Add it to your calendar and consider a collaborative recap or knowledge-sharing article post-conference!
Submitted by Regan Williams
on
Join the next Kawaiicon, New Zealand’s premier hacker conference, happening November 6–8, 2025 in Wellington. This year’s edition dives deep into modern exploit techniques, particularly automated memory corruption attacks and emerging mitigation strategies in native languages and runtimes.
Why it matters for SoS‑VO:
- Brings together researchers, developers, and security professionals focused on memory safety, exploit research, and defensive programming.
- Prior sessions featured topics on “automated memory corruption exploitation,” plus insights into sandboxing and secure runtime design .
- Complementary to ongoing initiatives like NSA/CISA guidance, OpenSSF Continuum, and wasm-based secure design approaches.
What to expect:
- Talks on memory corruption tools and fuzzing—showcasing how modern exploit automation is evolving.
- Hands-on sessions and CTFs, offering practical experience with exploit development and defenses.
- Community networking with open-source maintainers, language designers, and cybersecurity experts.
This event is ideal for developers, system integrators, and security teams implementing memory-safe practices, evaluating runtime security, or building tooling for legacy-native codebases. Add it to your calendar and consider a collaborative recap or knowledge-sharing article post-conference!
Submitted by Regan Williams
on