Schedule
Please find details for all talks here.
Two Days of Trainings (27./28. November)
Workshop 01 | Workshop 02 | Workshop 03 | Workshop 04 | Workshop 05 |
---|---|---|---|---|
Fundamentals of Routing and Switching for Blue and Red Team Paul Coggin (Financial Institution) |
Security Risks in Cellular Networks: Phone, RAN, and Core (closed) David Burgess (YateBTS) |
Malware Analysis Intro Christian Wojner |
Attacking Internet of Things with Software Defined Radio Johannes Pohl (Hochschule Stralsund) |
Hunting with OSSEC Xavier Mertens (Freelance Cyber Security Consultant / SANS ISC) |
Workshop 06 | Workshop 07 | Workshop 08 | Workshop 09 | Workshop 10 |
---|---|---|---|---|
Mobile App Attack 2.0 (closed) Sneha Rajguru |
Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation Dawid Czagan (Silesia Security Lab) |
Advanced Infrastructure Hacking Anant Shrivastava (NotSoSecure) |
ERP Security: Assess, Exploit and Defend SAP Platforms Pablo Artuso & Yvan Genuer (Onapsis) |
Advanced Penetration Testing in the Real World Davy Douhine & Guillaume Lopes (RandoriSec) |
All Trainings cover two days (from 09:30 to 18:30 every day) and include Lunch and two Coffee Breaks.
Two Days of Conference (29./30. November)
Throughout the conference you will get the opportunity of meeting experts at the Hacker's Lounge to discuss security issues and see demonstrations.
Conference, day 1 - Thu, 29 Nov
Left Pirouette | Right Pirouette | Riding School (ROOTS) | |
---|---|---|---|
08:00 | Registration opens | ||
09:00 | Opening DeepSec 2018 DeepSec Organisation Team (DeepSec In-Depth Security Conference) |
||
09:10 | Keynote: We're All Gonna Die Peter Zinn |
||
10:00 | Uncovering Vulnerabilities in Secure Coding Guidelines Fernando Arnaboldi (IOActive) |
Without a Trace – Cybercrime, Who are the Offenders? Edith Huber & Bettina Pospisil (Donau-Universität Krems) |
Keynote: Automatic Exploitation - The DARPA Cyber Grand Challenge, what came after, and what is next Kevin Borgolte (Princeton University) |
10:50 | Coffee Break | ||
11:10 | IoD - Internet of Dildos, a Long Way to a Vibrant Future Werner Schober (SEC Consult) |
Moving Money: Inside the Global Watchlist for Banking across Borders Jasmin Klofta & Tom Wills (Investigative Reporter NDR/ARD (Germany) & Datajournalist The Times of London (UK)) |
How Android's UI Security is Undermined by Accessibility Anatoli Kalysch (Friedrich-Alexander-Universität Erlangen-Nürnberg) |
12:00 | Suricata and XDP, Performance with an S like Security Eric Leblond (OISF) |
Who Watches the Watcher? Detecting Hypervisor Introspection from Unprivileged Guests Tomasz Tuzel (Assured Information Security) |
The Swift Language from a Reverse Engineering Perspective Malte Kraus & Vincent Haupert (Friedrich-Alexander University Erlangen-Nuremberg) |
12:50 | Lunch | ||
14:00 | Efail and other Failures with Encryption and E-Mail Hanno Böck (-) |
Defense Informs Offense Improves Defense: How to Compromise an ICS Network and How to Defend It Joe Slowik (Dragos) |
Library and Function Identification by Optimized Pattern Matching on Compressed Databases Maximilian von Tschirschnitz (Technical University of Munich) |
14:50 | SS7 for INFOSEC Paul Coggin (Financial Institution) |
Security Response Survival Skills Benjamin Ridgway (Microsoft) |
Kernel-Assisted Debugging of Linux Applications Tobias Holl, Philipp Klocke, Fabian Franzen (Technical University of Munich) |
15:40 | Coffee Break | ||
16:00 | New Attack Vectors for the Mobile Core Networks Dr. Silke Holtmanns (Nokia Bell Labs) |
Injecting Security Controls into Software Applications Katy Anton (CA Technologies | Veracode) |
T.B.A. |
16:50 | Offpath Attacks Against PKI Markus Brandt (Fraunhofer Institute for Secure Information Technology SIT) |
Blinding the Watchers: The Growing Tension between Privacy Concerns and Information Security Mark Baenziger (FireEye Deutschland GmbH) |
T.B.A. |
17:40 | Open Source Network Monitoring Paula de la Hoz Garrido (Student) |
Attacks on Mobile Operators Aleksandr Kolchanov (n/a) |
T.B.A. |
20:00 | Speaker's Dinner |