DeepSecVienna 2018 Nov. 27, 2018 to Nov. 28, 2018, Vienna, Austria

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: We're All Gonna Die Peter Zinn Let’s kick off this conference with a frank frolic into the future. What better way ...
Uncovering Vulnerabilities in Secure Coding Guidelines Fernando Arnaboldi Several government-related and private organizations provide guidance on how to improve the security of existing ...
Without a Trace – Cybercrime, Who are the Offenders? Edith Pospisil Cybercrime is a worldwide and diverse phenomenon, which needs multidisciplinary and global prevention and intervention ...
Keynote: Automatic Exploitation - The DARPA Cyber Grand Challenge, what came after, and what is next Kevin Borgolte The automatic exploitation of vulnerabilities has long been a holy grail for software security.However, even ...
IoD - Internet of Dildos, a Long Way to a Vibrant Future Werner Schober In recent years the internet of things has slowly creeped into our daily life and ...
Moving Money: Inside the Global Watchlist for Banking across Borders Jasmin Wills It's a rare glimpse of an otherwise tightly guarded datastore - and it's worrying: many ...
How Android's UI Security is Undermined by Accessibility Eric Leblond , Anatoli Kalysch Android's accessibility API was designed to assist users with disabilities, or temporarily preoccupied users unable ...
Who Watches the Watcher? Detecting Hypervisor Introspection from Unprivileged Guests Tomasz Tuzel Over the last decade we have seen a rapid rise in virtualization-based tools in which ...
The Swift Language from a Reverse Engineering Perspective Malte Vincent Over the last decade, mobile devices have taken over the consumer market for computer hardware. ...
Efail and other Failures with Encryption and E-Mail Hanno Böck The Efail bug against encrypted e-mails showed a variety of problems with the interaction of ...
Defense Informs Offense Improves Defense: How to Compromise an ICS Network and How to Defend It Joe Slowik ICS attacks have an aura of sophistication, high barriers to entry, and significant investment in ...
Library and Function Identification by Optimized Pattern Matching on Compressed Databases Paul Coggin , Maximilian Von Tschirschnitz , Benjamin Ridgway The goal of library and function identification is to find the original library and function ...
Kernel-Assisted Debugging of Linux Applications Tobias Holl , Philipp Klocke , Fabian Franzen On Linux, most---if not all---debuggers use the ptrace debugging API to control their target processes. ...
New Attack Vectors for the Mobile Core Networks Dr. Silke Holtmanns Structure of the talk:- Introduction & background- Introduction to interconnection network (What is it, how ...
Injecting Security Controls into Software Applications Katy Anton SQL Injection was first mentioned in a 1998 article in Phrack Magazine. Twenty years later, ...
Offpath Attacks Against PKI Markus Brandt The security of Internet-based applications fundamentally rely on the trustworthiness of Certificate Authorities (CAs). We ...
Blinding the Watchers: The Growing Tension between Privacy Concerns and Information Security Mark Baenziger This talk explores the growing tension between recent changes to customer and employee expectations of ...
Open Source Network Monitoring Paula Garrido I'd like to offer an introduction into Network System Monitoring using different open tools available ...
Attacks on Mobile Operators Aleksandr Kolchanov I'd like to talk about telecom security.My research contains information about security of mobile operators: ...
Everything is connected: how to hack Bank Account using Instagram Aleksandr Kolchanov Attacks on IVR systems and call centers of bank are interesting and funny, but sometimes ...
How to Communicate about IT Security without Getting the Cybers Hauke Berghoff A long long time ago any results from security research were mainly communicated via message ...
Cracking HiTag2 Crypto - Weaponising Academic Attacks for Breaking and Entering Kevin Sheldrake HiTag2 is an RFID technology operating at 125KHz. It is distinguished from many others in ...
A Tour of Office 365, Azure & SharePoint, through the Eyes of a Bug Hunter Dr.-ing Ashar Javed Cross-Site Scripting (XSS) outbreak has started almost twenty years ago and since then it has ...
Project Introduction: Data over Sound - Risks and Chances of an emerging Communication Channel Matthias Zeppelzauer The ultrasonic frequency band represents a novel and so far hardly used channel for the ...
Building your Own WAF as a Service and Forgetting about False Positives Juan Berner When a Web Application Firewall (WAF) is presented as a defensive solution to web application ...
Information, Threat Intelligence, and Human Factors John Bryk • There’s a huge difference between threat data, information, and intelligence. Understanding the difference is ...
Pure In-Memory (Shell)Code Injection in Linux Userland Reenz0h A lot of research has been conducted in recent years on performing code injection in ...
RFID Chip Inside the Body: Reflecting the Current State of Usage, Triggers, and Ethical Issues Ulrike Hugl Chipping humans can be seen as one of the most invasive biometric identification technologies. RFID ...
Discussion: Mobile Network Security Deepsec Guardian DeepSec 2018 focuses heavily on mobile security, especially mobility. As part of the outstanding group ...
DNS Exfiltration and Out-of-Band Attacks Nitesh Shilpkar The Domain Name Server or DNS is one of the most fundamental parts of the ...
Global Deep Scans - Measuring Vulnerability Levels across Organizations, Industries, and Countries Luca Bräunlein We introduce global deep scans that provide insights into the security hygiene of all organizations ...
Leveraging Endpoints to Boost Incident Response Capabilities Francisco Galian , Mauro Silva , Jules Massey In our day to day we constantly see how most of the organisations fail to ...
Drones, the New Threat from the Sky Dom (d#fu5e) Brack I will talk about drones. Drone risks and countermeasures. Drones have become an inherent risk ...
Security as a Community Healthcare: Helping Small Non-Profit Organisations Stay Secure Eva Blum-dumontet This talk will look at the way Privacy International has relied on its experience from ...
Anomaly Detection of Host Roles in Computer Networks Yury Kasimov Detecting malware infections is one of the most challenging tasks in modern computer security. Although ...
Can not See the Wood for the Trees - Too Many Security Standards for Automation Industry Frank Ackermann Plant operators and manufacturers are currently faced with many challenges in the field of automation. ...
Mapping and Tracking WiFi Networks / Devices without Being Connected Caleb Madrigal Sure, WiFi hacking has been around for a while, and everyone knows about tools like ...
Manipulating Human Memory for Fun and Profit Stefan Schumacher The human memory is very volatile and not really trustworthy. Judges, interrogators and scientists know ...