RuhrSecBochum 2018 May 17, 2018 to May 18, 2018, Bochum, Germany

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Is there any Security (and Privacy) in the Internet of Things? Dr. David Oswald Embedded (IoT) devices have become commonplace in many areas of our daily life, ranging from ...
From Discovering Vulnerabilities to Getting Them Fixed At Scale Dr. Ben Stock Security researchers are often faced with a dilemma once they have discovered a new type ...
Don't trust the DOM: Breaking XSS mitigations via Script Gadgets Sebastian Lekies Cross-Site Scripting is a constant problem of the Web platform. Over the years many techniques ...
Finding security vulnerabilities with modern fuzzing techniques René Freingruber Fuzzing is a very powerful technique to detect flaws and vulnerabilities in software. The aim ...
How client-side compilers help attackers to gain code execution Dr. Robert Gawlik Compilers of interpreter languages aim at speeding up execution in the race for web browser ...
The Story of Meltdown and Spectre Dr. Horn In this talk we will tell the story of Meltdown and Spectre. We will outline ...
Keynote: Weird machines, exploitability and unexploitability Thomas "halvar" Dullien In spite of being central to everything that is going on in IT security, the ...
Keynote: Securing the Development Lifecycle in Productions Systems Engineering Priv.-doz. Weippl Power plants and many other industrial plants are an integral part of a country’s critical ...
Exploring ROCA: Fun & troubles with RSA keypairs Dr. Petr Svenda The talk will cover our recent work which resulted in the discovery of an algorithmic ...
Revisiting the X.509 Certification Path Validation Dr. Falko strenzke In this work we present a new testing tool for the X.509 certification path validation ...
The ROBOT Attack Hanno Böck 20 years ago Daniel Bleichenbacher discovered an attack against RSA as it was used in ...
Consequences of Complexity in Group Instant Messaging using the Example of WhatsApp and Signal Paul Rösler Group instant messaging is a complex primitive – due to the number of involved users ...
Vulnerability handling process at Joomla! David Jardin In this talk, I will give you some first-hand insights into the work that the ...
Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels Damian Dresen OpenPGP and S/MIME are the two prime standards for providing end-to-end security for emails. We ...