Schedule

Please find details for all talks here.

Two Days of Trainings (15./16. November)

Workshop 1 Workshop 2 Workshop 3 Workshop 4 Workshop 5 Workshop 6 Workshop 7 Workshop A Workshop B
Online Training: Hacking JavaScript Desktop apps: Master the Future of Attack Vector
Anirudh Anand (7ASecurity)
Mobile Security Testing Guide Hands-On (closed)
Sven Schleier (WithSecure)
Mobile Network Security (closed)
James Bart Stidham (Telecom Experts LLC)
Online Training 28./29.11: Black Belt Pentesting / Bug Hunting Millionaire
Dawid Czagan (Silesia Security Lab)
Network Threat Hunting & Incident Response
Michael Meixner, Rainer Sykora CISSP (Computerforensic & more GmbH)
Deep Dive Into Malicious Office Documents For Offensive Security Professionals
Didier Stevens (NVISO)
Practical Secure Code Review
Seth Law (Redpoint Security, Inc.)
[Video Courses + Online Support] Web Hacking Expert: Full-Stack Exploitation Mastery
Dawid Czagan (Silesia Security Lab)
[Video Courses + Online Support] Web Hacking Secrets: How to Hack Legally and Earn Thousands of Dollars at HackerOne
Dawid Czagan (Silesia Security Lab)

All Trainings cover two days (from 09:30 to 18:30 every day) and include Lunch and two Coffee Breaks.

Two Days of Conference (17./18. November)

Throughout the conference you will get the opportunity of meeting experts at the Hacker's Lounge to discuss security issues and see demonstrations.

Conference, day 1 - Thu, 17 Nov
Track 2 (Strassburg) Track 1 (Paris) ROOTS / Workshops
08:00 Registration opens
09:00   DeepSec Opening
DeepSec
 
09:10   Complexity killed the Cat
René Pfeiffer (DeepSec Conference Organisation)
 
10:00 We Are Sorry That Your Mouse Is Admin - Windows Privilege Escalation Through The Razer Co-installer
Oliver Schwarz (SySS GmbH)
Wireless Keystroke Injection As An Attack Vector During Physical Assessments
Simonovi Sergei (Scientific Cyber Security Association / Caucasus University)
T.B.A.
10:50 Coffee Break
11:10 GitHub Actions Security Landscape
Ronen Slavin (Cycode)
The Need For a Human Touch In Cyber Security
Erlend Andreas Gjære (Secure Practice)
Secure and Flexible Precision Farming - with Drones
Dr. Markus Tauber (Research Studios Austria Forschungsgesellschaft mbH)
12:00 Auditing Closed Source Trusted Applications for Qualcomm Secure Execution Environment (QSEE)
Hector Marco & Fernando Vano (Cyber Intelligence S.L.)
Protecting Your Web Application/API With CrowdSec
Klaus Agnoletti (CrowdSec)
Developing and testing ICS related challenges for the Haaukins CTF platform
Robert Nedergaard Nielsen, Kristian Helmer Kjær Larsen (Aalborg University)
12:50 Lunch
14:00 Communicative Incident Response
Hauke Gierow, Paul Gärtner (PIABO)
Iran: A Top Tier Threat Actor
Steph Shample (Middle East Institute)
T.B.A.
14:50 End-to-end Health Data Privacy Using Secure 5G Data Channels
Dr. Razvan Bocu (Transilvania University of Brasov, Romania, Department of Mathematics and Computer Science)
Working In Warzones In Theory And In Practice
Enno Lenze (Berlin Story)
T.B.A.
15:40 Coffee Break
16:00 Identification of the Location in the 5G Network
Giorgi Akhalaia (Caucasus University, Scientific Cyber Security Association)
OPSEC - The Discipline Of The Grey Man
Robert Sell (Trace Labs)
Workshop: Trying out ICS challenges in a CTF (1/2)
Robert Nedergaard Nielsen, Kristian Helmer Kjær Larsen (Aalborg University')
16:50 A Survey Of Secure In-vehicle Communication
Miltos D. Grammatikakis (Hellenic Mediterranean University)
Ukrainian-Russian Warfare In Cyberspace: Technological And Psychological Aspects
Sergiy Gnatyuk (National Aviation University)
Workshop: Trying out ICS challenges in a CTF (2/2)
Robert Nedergaard Nielsen, Kristian Helmer Kjær Larsen (Aalborg University')
17:40 Towards The Automation Of Highly Targeted Phishing Attacks With Adversarial Artificial Intelligence
Francesco Morano and Enrico Frumento (Cefriel - Polytechnic of Milan)
Post-quantum Verkle Signature Scheme
Maksim Iavich (Caucasus University, Scientific Cyber Security Association)
T.B.A.
20:00 Speaker's Dinner
Conference, day 2 - Fri, 18 Nov
Track 2 (Strassburg) Track 1 (Paris) ROOTS / Workshops
09:00 Machine Learning Use In OSINT
Giorgi Iashvili (Caucasus University, Scientific Cyber Security Association)
Attacking Developer Environment Through Drive-by Localhost Attacks
Joseph Beeton (Contrast Security)
T.B.A.
09:50 Industrial-Security vs. IT-Security - What Can We Learn From Each Other?
Michael Walser (sematicon AG)
Malware And Exfiltration : A Telegram Story
Godwin Attigah (Google)
T.B.A.
10:40 Coffee Break
11:00 Detecting The Unknowns – Mobile Network Operators Cyber Resilience In Responding To Zero-day Exploit
Imran Saleem (Mobileum)
Signature-based Detection Using Network Timing
Josh Pyorre (Cisco Talos, Pyosec)
Trace Labs OSINT Search Party for Missing Persons CTF (1/4)
TraceLabs (TraceLabs)
11:50 The Story Continues: Hacking Some More "Secure" Portable Storage Devices
Matthias Deeg (SySS GmbH)
Vanquish: Analysis Everywhere With Smartphones
Hiroyuki Kakara (Trend Micro Incorporated)
Trace Labs OSINT Search Party for Missing Persons CTF (2/4)
TraceLabs (TraceLabs)
12:40 Lunch
14:00 Hey You! Get Off my Satellite!
Paul Coggin (nou Systems, Inc)
Cypher Query Injection - The New "SQL Injection" We Aren't Aware Of
Noy Pearl (Moon Active)
Trace Labs OSINT Search Party for Missing Persons CTF (3/4)
TraceLabs (TraceLabs)
14:50 Practical Mobile App Attacks By Example (online talk)
Abraham Aranguren (7ASecurity)
Anticipating Damage Control: Communicating About Cybersecurity Within And Outside Organizations
Prof. Matthieu J. Guitton, PhD, FRAI (Université Laval (Quebec City, QC, Canada))
Trace Labs OSINT Search Party for Missing Persons CTF (4/4)
TraceLabs (TraceLabs)
15:40 Coffee Break
16:00 Faking At Level 1 - How Digital Twins Save Your PLCs
Thomas Weber (CyberDanube / Security Reseracher)
Fighting Fire With Fire – Detecting DNS-tunneling With DNS
Artsiom Holub (Cisco Umbrella)
Workshop: Hands On EMUX - Emulating ARM and MIPS IoT Firmware (1/2)
Saumil Udayan Shah (saumil.net)
16:50 Cyber Maturity Doesn’t Just Happen. True Tales Of A Cyber Maturity Concept.
Uğur Can Atasoy (TryHackMe)
Melting the DNS Iceberg - Taking Over Your Infrastructure Kaminsky Style
Dipl.-Ing. Timo Longin BSc (SEC Consult Unternehmensberatung GmbH)
Workshop: Hands On EMUX - Emulating ARM and MIPS IoT Firmware (2/2)
Saumil Udayan Shah (saumil.net)
17:40 Your Phishing Assessment Is Bad & You Should Feel Bad
Alexander Riepl (CERT.at)
Hacker To Honcho
Darren Jones & Julian Botham (Valencia Risk)
T.B.A.
18:20 Closing Ceremony
18:30 - .:.
19:00 - T.B.A.