SecT 2014 Sept. 18, 2014 to Sept. 19, 2014, Fribourg,switzerland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Felix "fx" Lindner N/A
(To Be Most Neighborly Announced) Travis Goodspeed N/A
Thunderbolt and Lightning, very very frightening Loukas Kalenderidis People keep talking about Thunderbolt DMA attacks as though they're a foregone conclusion. Thus far, ...
Cats and Dogs Living Together: Langsec Is Also About Usability Meredith L. Patterson One premise underlies every argument about usability and security that has ever raged: "Secure software ...
Going deeper on aviation security Hugo Teso This presentation will explain and show how to remotely attack and take control of some ...
How I Evolved Your Fuzzer Fabien Duchene Fuzzing is the automatic creation and evaluation of inputs for discovering vulnerabilities. Traditional undirected black-box ...
Attacking Mobile Broadband Modems Like A Criminal Andreas Lindh While there has certainly been some interesting research into the security of mobile broadband modems, ...
IOT: How I Hacked My Home David Jacoby It is very often we hear about these over hyped new terms in the IT-security ...
A Random Talk (or how to attack randomly) Jussi This presentation goes through some memories from my vacation to the world of internet gaming, ...
Detecting the Heartbleed vulnerability Antti Karjalainen Presented by the engineer who initially detected the Heartbleed vulnerability, this talk will provide you ...
Memory Forensics and Security Analytics : Detecting Unknown Malware Fahad Ehsan This presentation will show how open source tools can be used to detect ‘Unknown’ malware ...
For Want of a Nail Sergey Bratus , Meredith L. Patterson Input parser bugs appear to be simple. For years, they've been among the best-understood bug ...
Unparseable Resource Locators Karl Zetterlund N/A
Route or be rooted: evolution of an often underestimated threat Marta Janus N/A
Fingerprinting signatures using interactions between cryptographic and network layers of a VPN Anna Shubina N/A