roots 2017 Nov. 16, 2017 to Nov. 17, 2017, vienna,austria

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Reverse Engineering a Code without the Code Jean-louis Lanet , Abdelhak Mesbah , Mohamed Mezghiche Retrieving assets from inside a secure element should be difficult. While the most attractive assets ...
A Survey On Automated Dynamic Malware Analysis Evasion and Counter-Evasion Alexei Bulazel , Bülent Yener Automated dynamic malware analysis systems are important in combating the proliferation of modern malware. Unfortunately, ...
On The (In-)Security Of JavaScript Object Signing and Encryption Juraj Somorovsky , Jörg Schwenk , Christian Mainka , Vladislav Mladenov , Dennis Detering JavaScript Object Notation (JSON) has evolved to the de-facto standard file format in the web ...
Out-of-Order Execution as a Cross-VM Side Channel and Other Applications Sophia D'antoine , Jeremy Blackthorne , Bülent Yener Given the rise in popularity of cloud computing and platform-as-a-service, vulnerabilities in systems which share ...
Dynamic Loader Oriented Programming on Linux Claudia Eckert , Thomas Kittel , Julian Kirsch , Bruno Bierbaumer Memory corruptions are still the most prominent venue to attack otherwise secure programs. In order ...
Security Analysis of the Telegram IM Josef Kokeš , Tomas Susanka Telegram is a popular instant messaging service, a self-described fast and secure solution. It introduces ...
Paying the Price for Disruption: How a FinTech Allowed Account Takeover Tilo Muller , Dominik Maier , Vincent Haupert This paper looks at N26, a pan-European banking startup and the poster child for young ...