Schedule
Please find details for all talks here.
Two Days of Trainings (15./16. November)
All Trainings cover two days (from 09:30 to 18:30 every day) and include Lunch and two Coffee Breaks.
Two Days of Conference (17./18. November)
Throughout the conference you will get the opportunity of meeting experts at the Hacker's Lounge to discuss security issues and see demonstrations.
Conference, day 1 - Thu, 17 Nov
Track 2 (Strassburg) | Track 1 (Paris) | ROOTS / Workshops | |
---|---|---|---|
08:00 | Registration opens | ||
09:00 | DeepSec Opening DeepSec |
||
09:10 | Complexity killed the Cat René Pfeiffer (DeepSec Conference Organisation) |
||
10:00 | We Are Sorry That Your Mouse Is Admin - Windows Privilege Escalation Through The Razer Co-installer Oliver Schwarz (SySS GmbH) |
Wireless Keystroke Injection As An Attack Vector During Physical Assessments Simonovi Sergei (Scientific Cyber Security Association / Caucasus University) |
T.B.A. |
10:50 | Coffee Break | ||
11:10 | GitHub Actions Security Landscape Ronen Slavin (Cycode) |
The Need For a Human Touch In Cyber Security Erlend Andreas Gjære (Secure Practice) |
Secure and Flexible Precision Farming - with Drones Dr. Markus Tauber (Research Studios Austria Forschungsgesellschaft mbH) |
12:00 | Auditing Closed Source Trusted Applications for Qualcomm Secure Execution Environment (QSEE) Hector Marco & Fernando Vano (Cyber Intelligence S.L.) |
Protecting Your Web Application/API With CrowdSec Klaus Agnoletti (CrowdSec) |
Developing and testing ICS related challenges for the Haaukins CTF platform Robert Nedergaard Nielsen, Kristian Helmer Kjær Larsen (Aalborg University) |
12:50 | Lunch | ||
14:00 | Communicative Incident Response Hauke Gierow, Paul Gärtner (PIABO) |
Iran: A Top Tier Threat Actor Steph Shample (Middle East Institute) |
T.B.A. |
14:50 | End-to-end Health Data Privacy Using Secure 5G Data Channels Dr. Razvan Bocu (Transilvania University of Brasov, Romania, Department of Mathematics and Computer Science) |
Working In Warzones In Theory And In Practice Enno Lenze (Berlin Story) |
T.B.A. |
15:40 | Coffee Break | ||
16:00 | Identification of the Location in the 5G Network Giorgi Akhalaia (Caucasus University, Scientific Cyber Security Association) |
OPSEC - The Discipline Of The Grey Man Robert Sell (Trace Labs) |
Workshop: Trying out ICS challenges in a CTF (1/2) Robert Nedergaard Nielsen, Kristian Helmer Kjær Larsen (Aalborg University') |
16:50 | A Survey Of Secure In-vehicle Communication Miltos D. Grammatikakis (Hellenic Mediterranean University) |
Ukrainian-Russian Warfare In Cyberspace: Technological And Psychological Aspects Sergiy Gnatyuk (National Aviation University) |
Workshop: Trying out ICS challenges in a CTF (2/2) Robert Nedergaard Nielsen, Kristian Helmer Kjær Larsen (Aalborg University') |
17:40 | Towards The Automation Of Highly Targeted Phishing Attacks With Adversarial Artificial Intelligence Francesco Morano and Enrico Frumento (Cefriel - Polytechnic of Milan) |
Post-quantum Verkle Signature Scheme Maksim Iavich (Caucasus University, Scientific Cyber Security Association) |
T.B.A. |
20:00 | Speaker's Dinner |