BalCCon2018 2018 Sept. 14, 2018 to Sept. 16, 2018, Novi Sad, Serbia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Blockchain: the top 10 security disasters Jean-phillipe Aumasson Many blockchain platforms support tokens, holding a total value of hundreds of millions, if not ...
Exploiting esoteric SQL injection vulnerabilities Bojanz Although SQL injection vulnerabilities are the most common web application vulnerabilities, many tools and penetration ...
Security Safari in b0rkenLand Watch out! There are dangerous Security Problems Hetti 2018 started really well for the internet regarding computer security. Let's take care of it ...
Backups (occasionally…) What could possibly go wrong Maclemon You do have backups, do you? Are you sure? I thought so as well… until… ...
Preventing CPU side-channel attacks with kernel tracking Hackman Marian will present a protection from Meltdown/Spectre types of attacks. He will also show, why ...
Emulating AVR from Scratch Featuring AVRS, an Emulator meant for Reverse Engineering Cluosh An overview of the AVR architecture and the challenges/opportunities for building an emulator from the ...
Masked reflected DDoS attacks, and how to protect against them Johnathan Roy Azaria Some attacks go unchanged for years, and a great example for this is reflected DDoS ...
Impact of domain name dropcatching on business security Kirils Solovjovs Domain names are the real estate of the internet. With every decade it becomes more ...
Comparing Malicious Files How many freaking names can we have for one malware family? Robert Simmons One critical step one must take during the malware analysis process is to attempt to ...
Phishing Phishers Turning the tables on phishers Arnim Eijkhoudt KPN is the largest telecom & internet services provider in the Netherlands. We have a ...
Free Your Android Liberate Your Device! Albert While Android is a mostly free operating system, many devices contain non-free drivers as well ...
How I survived ICO! Milan Gabor ICOs are a common way now to collect some funding and issuing tokens at the ...
Modern Commandline Tools V1.4 (English Edition) Effective, Better, Faster, Useful - Alternatives to grep, ls, find, ... Leyrer ls, grep, find, ifconfig. We all know these tools and use them on a daily ...
Towards the perfect cryptocurrency wallet Nemanja Last year we witnessed a huge leap in value for many cryptocurrencies, which attracted much ...
Public Code with Free Securing Our Digital Public Infrastructure Max Mehl The "Public Money? Public Code!" initiative has been created to make all code developed with ...
Tales from the hunt Some less hyped bugs in (web)apps Tonimir Kišasondi Everyone is talking about common classes of bugs, sql injection, XSS, CSRF, IDOR etc... But, ...
Amateur radio activity days Everything You Always Wanted to Know About Amateur radio * But Were Afraid to Ask Abakalov During Balccon2k18 we will be active making amateur radio QSOs (contacts) with stations worldwide using ...
Toll of personal privacy in 2018 Kirils Solovjovs In this 50 minute long talk the author will present their personal privacy choices that ...
Application Container Security Container crash course for hackers, defenders and pentesters Kost Application Containers like LXD, Docker and rkt are popular ways of containerization of each application. ...
Secrets and Time - how much torture can you endure until your key expires. Protecting journalists and researchers with distributed cryptography. Smuggler Journalists and researchers find themselves in an environment where their digital devices are subject to ...
Spectre & Co. For Mere Mortals How To Explain Risk To Muggles Frank Rustemeyer A new language is needed to explain tough bits of computer science and engineering like ...
How to achieve both economic and personal freedom using globality and flexibility. Crypto liberation story of one perpetual traveler Wilder Crypto liberation story of one perpetual traveler: How to achieve both economic and personal freedom ...
Hacking Driverless Vehicles Zoz Autonomous and unmanned systems are already patrolling our skies and oceans and being tested on ...
automated number plate readers why ANPR such and what that has to do with missing user input verification Mc.fly I played around with automated number plate recognition systems in the netherlands.They are broken.I will ...
Riding the wave Vladan Nikolić SDR - demystifying magic. What SDR is and how it can be used to compromise ...
Email, how does it even work? Maclemon Email is one of the oldest federated social networks in IT history. Its roots date ...
Sustainability challange and the role of hackers Igo Nikolic A lecture exploring the global sustainability transition from the technical, social, economic and environmental perspectives, ...
Dicussion on sustainability and hackers Igor Nikolic Follow up discussion, exploring the topics discussed in the lecture and any other related aspect ...
Dancing in the Dark Inertial Navigation MEMS sensors basics Bogdan Doroslovac MEMS technology is in almost every smart device around us, ranging from smart watches to ...
Hybrid Cloud Seeding Hacking Microsoft Hybrid Cloud Infrastructure Tanoy "notty" Bose , Blueberry Vignesh4303 During a red team exercise, one of the prime crown jewel that the attacker targets ...
A WinDbg full of tricks Malware analysis tricks using WinDbg Vanja WinDbg is a powerful debugging environment allowing an analyst to dig into the Windows internals ...