troopers 2016 March 16, 2016 to March 17, 2016, heidelberg,germany

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Keynote Ben Zevenbergen N/A
Hiding your White-Box Designs is Not Enough Philippe Teuwen Although all current scientific white-box publications are academically broken, there is still a large number ...
Mind The Gap - Exploit Free Whitelisting Evasion Tactics Casey Smith More and more entities are deploying Application Whitelisting to prevent malware and detect sophisticated intruders. ...
Patch me if you can Sebastian Schinzel , Andreas Wiegenstein , Damian Poddebniak This talk discusses a number of severe security issues in SAP's patch process discovered in ...
Attacking Next-Generation Firewalls Felix Wilhelm "Next-Generation" firewalls provide functionality well beyond the traditional filtering capabilities. They offer deep protocol inspection, ...
Towards a LangSec-aware SDLC Jacob Torrey The keynote of TROOPERS'15 by Prof. Sergey Bratus highlighted the findings of language-theoretical security (LangSec) ...
Preventing vulnerabilities in HANA-based deployments Juan Perez-etchegoyen , Nahuel Sanchez Companies nowadays are choosing in between on-premise, cloud and hybrid deployment models. The common factor ...
QNX: 99 Problems but a Microkernel ain't one! Alex Plaskett , Georgi Geshev Cars, Turbines, Safety Critical Systems and consumer devices (phones) all run QNX, however, very little ...
Cloud Seeding or Finding weird machines in the cloud crowd sourced economy. Graeme Neilson , Vladimir Wolstencroft Our sharing economy is defining many aspects of our lives, how we travel, order food, ...
An easy way into your multi-million dollar SAP systems: An unknown default SAP account Joris Vis Fortunately more and more SAP customers start securing their business critical SAP infrastructure after many ...
unrubby: reversing without reversing Richo Healey Obfuscating code is typically the domain of native code, or at least statically dispatched bytecode ...
Imma Chargin Mah Lazer - How to protect against (D)DoS attacks Oliver Matula Distributed Denial of Service (DDoS) attacks have been transformed into a social activity by easy-to-use ...
Thanks SAP for the vulnerabilities. Exploiting the unexploitable Alexander mikhailovich Polyakov , Dmitry Chastuhin Bla-blah-blah SAP. Bla-blah-blah big companies. Bla-blah-blah hack multi-million dollar systems. This is how typical SAP ...
I Have the Power(View): Offensive Active Directory with PowerShell Will Schroeder Active Directory has been covered from a system administration perspective for as long as it ...
Learn about the enemy – How to profile national APT hacking group Jinwook Chung , Moonbeom Park Every year, so many hacking incidents and cyber terrors happen in the South Korea. So, ...
Deep-dive into SAP archive file formats Martin Gallo SAP systems use of custom archive file formats in several different places, such as for ...
Reverse Engineering a Digital Two-Way Radio Travis Goodspeed , Christiane Ruetten The Tytera MD380 is handheld transceiver for the Digital Mobile Radio (DMR) protocol, also known ...
Crypto code: the 9 circles of testing Jean-Philippe Aumasson Major crypto vulnerabilities would have been detected if we had better testing methodologies and tools. ...
Freifunk - Building a free and open network Ben Oswald In many countries you can enjoy free wifi access to the internet nearly everywhere. Also ...
Hollywood Hacking Adrian ( atrox ) Dabrowski Why did it take 15 Years to finally be able to transfer a Winword file ...
Passive Intelligence Gathering and Analytics - It’s all Just Metadata! Christopher Truncer When it comes to defending our networks or operational environment, it requires more information than ...
Real-life Software-Defined Security Ivan Pepelnjak Vendors, pundits, and industry media love to talk about Software-Defined Everything, but nothing ever changes ...
Broadcasting your attack: Security testing DAB radio in cars Andy Davis Digital Audio Broadcasting (DAB) radio receivers can be found in many new cars and are ...
THE KINGS IN YOUR CASTLE - All the lame threats that own you but will never make you famous Marion Marschalek , Raphaël Vinot It is the same question being directed to audiences around the security conference scene: How ...
BetterCrypto: three years in Aaron Zauner The BetterCrypto Project started out in the fall of 2013 as a collaborative community effort ...
The road to secure Smart Cars: ENISA approach Cédric Levy-bencheton The presentation will deal with cyber security of IoT and smart cars. It will present ...
Rapid Radio Reversing Michael Ossmann Wireless security researchers have an unprecedented array of tools at their disposal today. Although Software ...
Attacking & Protecting Big Data Environments Matthias Luft , Birk Kauer In this talk we will show how to attack enterprise-grade "big data" environments, based on ...
Medical Device Security: Hack or Hype? Kevin Fu How has the field of medical device security evolved since the 2008 hack of a ...
The Joy of Sandbox Mitigations James Forshaw When researchers think of Microsoft Windows process mitigations they're likely to come up with DEP ...
How to Implement an SDL in a Large Company Arne Lüdtke Implementing an SDL Process is difficult, especially in a big company. Arne Lüdtke from Bosch ...
How easy to grow robust botnet with low hanging fruits (IoT) - for free Attila Marosi Every day there are new vulnerabilities exposed and this “malicious knowledge” can be used by ...
Caring for file formats Ange ( ange4771 ) Albertini Getting hacked is our most common fear when we open a file, but many other ...
Russian attack: Live demos of their steps, tools, techniques Wayne Huang , Sun Huang We live-demo (as an attacker) many Russian crimeware that's never been disclosed before, including tools ...