Schedule

Please find details for all talks here.

Two Days of Trainings (14./15. November)

Workshop 01 Workshop 02 Workshop 03 Workshop 04 Workshop 05
Hunting The Adversary: Developing And Using Threat Intelligence
John Bambenek (Fidelis Cybersecurity / SANS Internet Storm Center)
Open Source Defensive Security (closed)
Leszek Mis (Defensive Security)
SAP CTF Pentest : From Outside To Company Salaries Tampering (closed)
Yvan Genuer (Devoteam)
How To Be A Ghost
Rhett Greenhagen and Jean Yav (McAfee)
Advanced Penetration Testing In The Real World (closed)
Guillaume Lopes (Cisco) / Davy Douhine (RandoriSec)
Workshop 06 Workshop 07 Workshop 08 Workshop 09 Workshop 10
Smart Lockpicking - Hands-on Exploiting Contemporary Locks and Access Control Systems
Slawomir Jasek (SecuRing; smartlockpicking.com)
Workshop On Advanced Social Engineering (closed)
Dominique Brack (Reputelligence)
Mobile App Attack
Sneha Rajguru (Payatu software labs llp)
The ARM IoT Exploit Laboratory (Three-Day Workshop) (closed)
Saumil Shah (Net-Square Solutions Pvt. Ltd.)
T.B.A.

All Trainings cover two days (from 09:30 to 18:30 every day) and include Lunch and two Coffee Breaks.

Two Days of Conference (16./17. November)

Throughout the conference you will get the opportunity of meeting experts at the Hacker's Lounge to discuss security issues and see demonstrations.

Conference, day 1 - Thu, 16 Nov
Left Pirouette Right Pirouette Riding School (ROOTS)
08:00 Registration opens
09:00  
T.B.A.
 
09:10   Social Science First!
Dr. Jessica Barker (Co-Founder, Redacted Firm)
 
10:00 Don't Let The Cuteness Fool You - Exploiting IoT's MQTT Protocol
dalmoz (Moshe Zioni) (VERINT)
Next-Gen Mirai
Balthasar Martin & Fabian Bräunlein (SRlabs)
Paying The Price For Disruption: A FinTech Allowed Account Takeover
Vincent Haupert, Dominik Maier, and Tilo Müller (FAU, TU Berlin, FAU)
10:50 Coffee Break
11:10 Lessons Learned: How To (Not) Design Your Own Protocol
Nicolai Davidsson (zyantific)
XFLTReaT: A New Dimension In Tunnelling
Balazs Bucsay (NCC Group)
A Survey On Automated Dynamic Malware Analysis Evasion And Counter-Evasion: PC, Mobile, And Web
Alexei Bulazel & Bulent Yener (River Loop Security, LLC, Rensselaer Polytechnic Institute)
12:00 Lock, Stock And Two Smoking Apples - XNU Kernel Security
Alex Plaskett & James Loureiro (MWR InfoSecurity)
Behavior Based Secure And Resilient System Development
Dr. Muhammad Taimoor Khan (Alpen-Adria University, Klagenfurt, Austria)
Dynamic Loader Oriented Programming On Linux
Julian Kirsch, Bruno Bierbaumer, Thomas Kittel, Claudia Eckert (Technical University of Munich)
12:50 Lunch
14:00 ML Clustering Attacks: A Walk outside the Lab
Gilad Yehudai (Imperva)
A Song of Botnets and Power: Blackout is coming
Adrian Dabrowski (SBA Research)
Reverse Engineering a Code without the Code
Mesbah Abdelhak (Université de Boumerdes), Jean-Louis Lanet (LHS INRIA)
14:50 Who Hid My Desktop – Deep Dive Into hVNC
Or Safran & Pavel Asinovsky (IBM Security Trusteer)
Insecurity In Information Technology
Tanya Janca (Canadian Government)
T.B.A.
15:40 Coffee Break
16:00 How To Hide Your Browser 0-days: Free Offense And Defense Tips Included
Zoltan Balazs (MRG Effitas)
Repairing The internet With Responsible Disclosures
Victor Gevers (0xDUDE) (GDI.foundatoin)
T.B.A.
16:50 Malware Analysis: A Machine Learning Approach
Chiheb Chebbi (TEK-UP University)
PeopleSoft: Hack The Planet's Universities
Dmitry Yudin (https://erpscan.com)
T.B.A.
17:40 Skip Tracing For Fun And Profit
Rhett Greenhagen (McAfee)
The Future of the Internet
Josh Pyorre (Cisco/OpenDNS)
T.B.A.
20:00 Speaker's Dinner
Conference, day 2 - Fri, 17 Nov
Left Pirouette Right Pirouette Riding School (ROOTS)
09:00 Uncovering And Visualizing Botnet Infrastructure And Behavior
Josh Pyorre & Andrea Scarfo (OpenDNS/Cisco)
Intel AMT: Using & Abusing The Ghost In The Machine
Parth Shukla (Google)
T.B.A.
09:50 Normal Permissions In Android: An Audiovisual Deception
Constantinos Patsakis (University of Piraeus)
Hacking The Brain For Fun And Profit
Stefan Hager (DATEV eG)
Out-Of-Order Execution As A Cross-VM Side Channel And Other Applications
Sophia d’Antoine, Jeremy Blackthorne, Bülent Yener (Trail of Bits, Rensselaer Polytechnic Institute)
10:40 Coffee Break
11:00 Forensic Accounting – The What, Why And How
Ulrike Hugl (University of Innsbruck)
Making Security Awareness Measurable
Stefan Schumacher (Magdeburger Institut für Sicherheitsforschung)
On The (In-)Security Of JavaScript Object Signing and Encryption
Dennis Detering, Juraj Somorovsky, Christian Mainka, Vladislav Mladenov, Jörg Schwenk (Horst Görtz Institute for IT Security, Chair for Network and Data Security, Ruhr-University Bochum)
11:50 I Wrote my Own Ransomware; Did Not Make 1 Iota Of A Bitcoin
Thomas Fischer (Digital Guardian)
Cloud Of Suspicion: Scaling Up Phishing Campaigns Using Google Apps Scripts
Maor Bin (Proofpoint)
Enhancing Control Flow Graph Based Binary Function Identification
Clemens Jonischkeit, Julian Kirsch (Technical University of Munich)
12:40 Lunch
14:00 BITSInject - Control Your BITS, Get SYSTEM
Dor Azouri (Security researcher @SafeBreach)
How Secure Are Your VoLTE And VoWiFi Calls?
Sreepriya Chalakkal (ERNW GmbH)
Security Analysis Of The Telegram IM
Tomas Susanka & Josef Kokeš (Czech Technical University in Prague)
14:50 Essential Infrastructure Interdependencies: Would We Be Prepared For Significant Interruptions?
Herbert Saurugg (Cyber Security Austria)
BitCracker: BitLocker Meets GPUs
Elena Agostini (National Research Council of Italy)
T.B.A.
15:40 Coffee Break
16:00 Bypassing Web Application Firewalls
Khalil Bijjou (EUROSEC GmbH)
OpenDXL In Active Response Scenarios
Tarmo Randel (CCDCOE)
T.B.A.
16:50 How I Rob Banks
Freakyclown (Redacted Firm)
Securing The Darknet
Jens Kubieziel (TorServers.net)
T.B.A.
17:40 A Story Of A Vulnerability: How To Execute Code On A Forensic Workstation
Wolfgang Ettlinger (SEC Consult)
Building Security Teams
Astera Schneeweisz (SoundCloud)
T.B.A.
18:20 Closing Ceremony
18:30 - .:.
19:00 - "The Maze" by Friedrich Moser