Ruhrsec 2017 May 17, 2017 to May 18, 2017, bochum,germany

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening, Marcus Niemietz N/A
Keynote: How to Build Hardware Trojans, Christof Paar Countless systems ranging from consumer electronics to military equipment are dependent on integrated circuits (ICs). ...
Rowhammer Attacks: A Walkthrough Guide, Clémentine Maurice , Daniel Gruss In the past 2 years the so-called Rowhammer bug has caught the attention of many ...
Using Microarchitectural Design to Break KASLR and More, Anders Fogh Typically, hackers focus on software bugs to find vulnerabilities in the trust model of computers. ...
Teach a Man to Phish and You Feed Him for a Lifetime, Armin Buescher Phishing might seem like a simple attack vector relying on gullible users to happily give ...
Five Years of Android Security Research: the Good, the Bad, the Ugly, Sven Bugiel Android security and privacy research has boomed in recent years, far outstripping investigations of other ...
A new categorization system for Side-channel attacks on mobile devices & more, Veelasha Moonsamy Side-channel attacks on mobile devices have gained increasing attention since their introduction in 2007. While ...
The (In)Security of Automotive Remote Keyless Entry Systems (revisited), David Oswald Remote keyless entry (RKE) systems, usually based on so-called rolling codes, are the most widespread ...
Keynote 2: SSH: Beyond Confidentiality and Integrity in Practice, Kenny Paterson This talk presents a systematic analysis of symmetric encryption modes for SSH that are in ...
0-RTT Key Exchange with Full Forward Secrecy, Tibor Jager Reducing latency overhead while maintaining critical security guar- antees like forward secrecy has become a ...
Breaking and Fixing a Cryptocurrency, Martin Grothe Bitcoin has been hailed as a new payment mechanism, and is currently accepted by millions ...
Black-Box Security Analysis of State Machine Implementations, Joeri De Ruiter State machines play an important role when implementing any protocol. They specify which messages are ...
Advanced SSL/TLS Deployment Strategies, Frederik Braun The web has evolved from hypertext to a powerful application platform. Powerful features like Geolocation, ...
Secrets of the Google Vulnerability Reward Program, Krzysztof Kotowicz In Google VRP, we receive and process over 600 vulnerability reports a month. While the ...