t2 2016 Oct. 27, 2016 to Oct. 28, 2016, helsinki,finland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Learning the wrong lessons from Offense Haroon Meer Since the early 90's when Dan Farmer and Wietse Venema wrote "Improving the Security of ...
Ghosts of the Past Peter Kosinar Targeted malware can be like a supernova: once it is discovered and publicly exposed, it ...
Nano-Scale Red Teaming: Making REs Cry With Device-Specific Opaque Execution Jacob Torrey This talk will begin by examining architectural “tells” that can be utilized to detect the ...
DVB-T Hacking - I can hack your shows Amihai Neiderman DVB-T is a standard for digital television broadcasting. The standard requires a consumer who wants ...
Building Management System Security Egor Litvinov Every modern business center, skyscraper or even your house is automated. Building automation technologies are ...
Hardened Linux 101 Timo Teräs Discussion of linux application hardening techniques (eg. SSP, ASLR, Fortify, RELRO). We take a deep ...
Sweet Tools O' Mine - because you don't hunt lions with blanks Hugo Teso This is not another talk about how to hack [TARGET HERE]. By now we all ...
Dive into the dark web Juha Nurmi This presentation explores usage patters of the Tor network: • What is this great technology ...
One template to rule'em all Kostas Lintovois , Vincent Yiu Current attack vectors indicate that malware families are still abusing Microsoft Office's functionality to attack ...
Windows OPSEC, where are the attackers hiding Jarno Niemelä Anyone who has been doing forensics knows that either attackers are easy to find, or ...
How to fool an ADC II or attacks against data processing in sigma-delta Alexander Bolshev We live in the analog world but program and develop digital systems. The key element ...