Archive
Please note that the agenda is still in the works and thus exact tracks,dates, and time of the talk are still subject to change.
Stay tuned & Monitor this site for updates.
Opening Keynote
Hiding your White-Box Designs is Not Enough
Mind The Gap - Exploit Free Whitelisting Evasion Tactics
Patch me if you can
Attacking Next-Generation Firewalls
Towards a LangSec-aware SDLC
Preventing vulnerabilities in HANA-based deployments
QNX: 99 Problems but a Microkernel ain't one!
Cloud Seeding or Finding weird machines in the cloud crowd sourced economy.
An easy way into your multi-million dollar SAP systems: An unknown default SAP account
unrubby: reversing without reversing
Imma Chargin Mah Lazer - How to protect against (D)DoS attacks
Thanks SAP for the vulnerabilities. Exploiting the unexploitable
I Have the Power(View): Offensive Active Directory with PowerShell
Learn about the enemy – How to profile national APT hacking group
Deep-dive into SAP archive file formats
Reverse Engineering a Digital Two-Way Radio
Lightning Talks
Crypto code: the 9 circles of testing
Hollywood Hacking
2nd Day Keynote
Passive Intelligence Gathering and Analytics - It’s all Just Metadata!
Real-life Software-Defined Security
Broadcasting your attack: Security testing DAB radio in cars
THE KINGS IN YOUR CASTLE - All the lame threats that own you but will never make you famous
BetterCrypto: three years in
The road to secure Smart Cars: ENISA approach
Rapid Radio Reversing
Attacking and Protecting Big Data Environments
Medical Device Security: Hack or Hype?
The Joy of Sandbox Mitigations
How to Implement an SDL in a Large Company
How easy to grow robust botnet with low hanging fruits (IoT) - for free
Caring for file formats
Russian attack: Live demos of their steps, tools, techniques
Unpatchable Living with a vulnerable implanted device
Closing Remarks