Sec-T 2013 Sept. 12, 2013 to Sept. 13, 2013, Stockholm,Sweden

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Fuzzing and Living room in the datacenter Michel Aubizzierre This talk will introduce the audience to vulnerability discovery by 'fuzzing'. Fuzzing is a technique ...
Assurance testing for businesses or why your IT-security products suck Olleb This presentation will demonstrate the importance of testing products not only from a functional perspective ...
Mithril: Cleaving parser differentials in ELF tools Sergey Bratus , Julian Bangert The ELF format is generated and consumed by many different tools both in the build ...
Pivoting in the Amazon clouds Andrès Pablo Riancho From no access at all, to the company Amazon’s root account, this talk will teach ...
Linda Wu & the Night of the Leeches Dan Farmer IPMI is a protocol that enables remote management of servers. Published by Intel and created ...
Lightning talk: Dealing with a Post-democratic system Scusi What to do about the post-democratic system and the surveillance state we now live in.
Lightning talk: what if they give us an attack and everyone came Jussi collaborative cyber defence
Turbo talk: Copernicus: "Question your assumptions" (about BIOS Vulnerability) John Butterworth BIOS security is most likely not at all on your radar. Consequently, the BIOS is ...
Injecting evil code in your SAP J2EE systems: Security of SAP Software Deployment Server Neyolov Evgeny Why break critical systems themselves when we can attack Deployment Server: the core from which ...
BIOS Chronomancy John Butterworth In 2011 the National Institute of Standard and Technology (NIST) released a draft of special ...
How to hack a country for fun and profit David Jacoby We often hear about how companies get compromised by zeroday vulnerabilities. When I started to ...
Hacking Mainframes: How to go Straight to Prison Philip Young Springtime in Sweden. The birds are out, and somewhere the scene from Hackers with Penn ...
Aircraft hacking Hugo Teso This presentation will be a practical demonstration on how to remotely attack and take full ...