Schedule

Please find details for all talks here.

Two Days of Trainings (15./16. November)

Workshop 1 Workshop 2 Workshop 3 Workshop 4 Workshop 5 Workshop 6 Workshop 7 Workshop A Workshop B
Online-Onsite Training: Hacking JavaScript Desktop apps: Master the Future of Attack Vector
Abraham Aranguren (7ASecurity)
Mobile Security Testing Guide Hands-On (Hybrid edition)
Sven Schleier (WithSecure)
Mobile Network Security
James Bart Stidham (Telecom Experts LLC)
Black Belt Pentesting / Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation
Dawid Czagan (Silesia Security Lab)
Network Threat Hunting & Incident Response
Michael Meixner, CISSP (Computerforensic & more GmbH)
DEEP DIVE INTO MALICIOUS OFFICE DOCUMENTS FOR OFFENSIVE SECURITY PROFESSIONALS
Didier Stevens (NVISO)
Practical Secure Code Review
Seth Law, Ken Johnson (Redpoint Security, Inc.)
Online Course: Full-Stack Exploitation Mastery
Dawid Czagan (Silesia Security Lab)
Online Course: How to Hack Legally and Earn Thousands of Dollars at HackerOne
Dawid Czagan (Silesia Security Lab)

All Trainings cover two days (from 09:30 to 18:30 every day) and include Lunch and two Coffee Breaks.

Two Days of Conference (17./18. November)

Throughout the conference you will get the opportunity of meeting experts at the Hacker's Lounge to discuss security issues and see demonstrations.

Conference, day 1 - Thu, 17 Nov
Track 1 Track 2 (ROOTS)
08:00 Registration opens
09:00  
T.B.A.
 
09:10  
T.B.A.
 
10:00 We are sorry that your mouse is admin - Windows privilege escalation through the Razer co-installer
Oliver Schwarz (SySS GmbH)
Phishing with Phineas Again , Purple Hack Recreation on Steroid
Georgios Karantzas and Constantinos Patsakis (University of Piraeus Student and Professor)
T.B.A.
10:50 Coffee Break
11:10 GitHub Actions Security Landscape
Ronen Slavin (Cycode)
The Need For a Human Touch In Cyber Security
Erlend Andreas Gjære (Secure Practice)
T.B.A.
12:00 Auditing Closed Source Trusted Applications for Qualcomm Secure Execution Environment (QSEE)
Hector Marco & Fernando Vano (Cyber Intelligence S.L.)
Automatic Recovery of Cyber Physical Systems Applications against Known Attacks
Dr M Taimoor Khan (University of Greenwich)
T.B.A.
12:50 Lunch
14:00 Communicative incident response
Hauke Gierow (PIABO)
Iran: A top tier threat actor
Steph Shample (Middle East Institute)
T.B.A.
14:50 Kates' Pot: Finding Attacks Against Kubernetes Deployments
Matthias Meidinger (Red Hat)
Melting the DNS Iceberg - Taking over your infrastructure Kaminsky style
Dipl.-Ing. Timo Longin BSc (SEC Consult Unternehmensberatung GmbH)
T.B.A.
15:40 Coffee Break
16:00 Identification of the location in 5G Network
Giorgi Akhalaia (Caucasus University, Scientific Cyber Security Association)
OPSEC - The Discipline of the Grey Man
Robert Sell (Trace Labs)
T.B.A.
16:50 A survey of secure in-vehicle communication
Miltos D. Grammatikakis (Hellenic Mediterranean University)
End-to-end Health Data Privacy Using Secure 5G Data Channels
Dr. Razvan Bocu (Transilvania University of Brasov, Romania, Department of Mathematics and Computer Science)
T.B.A.
17:40 Towards the Automation of Highly Targeted Phishing Attacks with Adversarial Artificial Intelligence
Francesco Morano and Enrico Frumento (Cefriel - Polytechnic of Milan)
Post-quantum Verkle signature scheme
Maksim Iavich (Caucasus University, Scientific Cyber Security Association)
T.B.A.
20:00 Speaker's Dinner
Conference, day 2 - Fri, 18 Nov
Track 1 Track 2 (ROOTS)
09:00 Machine Learning use in OSINT
Giorgi Iashvili (Caucasus University)
Attacking Developer environment through drive-by localhost attacks
Joseph Beeton (Contrast Security)
T.B.A.
09:50 Your Phishing assessment is bad & you should feeld bad
Alexander Riepl (CERT.at)
Malware and Exfiltration : A telegram story
Godwin Attigah (Google)
T.B.A.
10:40 Coffee Break
11:00 Detecting the unknowns – Mobile Network Operators cyber resilience in responding to zero-day exploit
Imran Saleem (Mobileum)
Signature-based Detection using Network Timing
Josh Pyorre (Cisco Talos, Pyosec)
T.B.A.
11:50 The Story Continues: Hacking Some More "Secure" Portable Storage Devices
Matthias Deeg (SySS GmbH)
Vanquish: Analysis Everywhere with Smartphones
Hiroyuki Kakara (Trend Micro Incorporated)
T.B.A.
12:40 Lunch
14:00 Hey You! Get off my Satellite!
Paul Coggin (nou Systems, Inc)
T.B.A.
T.B.A.
14:50 Practical Mobile App Attacks By Example
Abraham Aranguren (7ASecurity)
Anticipating Damage Control: Communicating about Cybersecurity within and outside Organizations
Prof. Matthieu J. Guitton, PhD, FRAI (Université Laval (Quebec City, QC, Canada))
T.B.A.
15:40 Coffee Break
16:00 Faking at Level 1 - How Digital Twins Save Your PLCs
Thomas Weber (CyberDanube / Security Reseracher)
Hacker To Honcho
Darren Jones & Julian Botham (Valencia Risk)
T.B.A.
16:50
T.B.A.
T.B.A.
T.B.A.
17:40
T.B.A.
T.B.A.
T.B.A.
18:20 Closing Ceremony
18:30 - .:.
19:00 - T.B.A.