hacktivity 2013 Oct. 11, 2013 to Oct. 12, 2013, Budapest,Hungary

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Security implications of the CrossOrigin Resource Sharing Gergely Révay N/A
GSM have we overslept the last wakeup call? Domonkos Tomcsanyi N/A
Advanced(?) Persistent Shellcode Gabor Szappanos N/A
Tempest, the hidden source of data leakage László Miklós Bíró N/A IncludeThinkstScapes TEMPEST
Hacking CCTV systems Benjamin Tamási N/A
”The Only Thing That Is Constant Is Change” Mihály Zágon N/A
The “Facebook PokerAgent” Robert Lipovsky N/A
I know what you downloaded this summer – is BitTorrent really providing anonymity? Tamás Bogár N/A
Playing Hide and Seek with Dalvik Executables Axelle Apvrille N/A
What’s common in Oracle and Samsung? They tried to think differently about crypto Ferenc Spala , László Tóth N/A
Injecting evil code in your SAP J2EE systems: Security of SAP Software Deployment Server Dmitriy Chastuchin N/A
Cyber soldiers in the world – how to become a military hacker? Csaba Krasznay N/A
Legal Background of Cybercrime Dániel Eszteri N/A
Data Extraction In the Age of Social Web Ákos Bardóczi , Lilian Zsákai N/A
Attackdriven defense Zane Lackey N/A
Alice in eXploitland, attack and defense evolution Zoltan Balazs N/A
Services of Computer Forensics Laboratories Sándor Péter Bartók N/A
Management of Confidential Information and Data Protection In Cloud Computing Géza Tényi N/A
Building the First Android IDS on Network Level; Stealth servers need Stealth Packets Jaime Sanchez N/A
HTTP Time Bandit Vaagn Toukharian N/A
Stolen bytes on the video card –the GPU as an antirce device Tamas Szakaly N/A
Anonim whistleblowing using the GlobaLeaks platform Ákos Maróy , Tamás Bodoky N/A
One a Penny, Two a Penny Hot DDoS run Tamás Székely N/A
Inside the illegal traffic sales Evgeny Neyolov N/A
Heureka The Suspicious Thing Is That It's Not Suspicious Balint Vargaperke , 'buherator N/A
Protection against the C&C traffic of malware Ferenc Leitold , Botond Horváth N/A
Face Recognition Systems Csaba Otti , András Fehér N/A
eNeMI: Evading the stateoftheart hardware protection of I/O virtualization Gábor Pék N/A
What happened to targeted malware attacks last year? Boldizsár Bencsáth N/A Malware IncludeThinkstScapes Survey
Oracle 12c Security Defense and Attack Paul M. Wright N/A
Interpretation of the Act on Information Security Lajos Muha N/A
Opening Ceremony Peter Papp , Lajos Antal , Mihály Zala N/A
Mobile Threats Hype vs. Reality Charlie Miller N/A IncludeThinkstScapes Mobile Security
The Cyber Arms Race Mikko Hypponen N/A
Mobile Threats Hype vs. Reality Live Feed from the Security Theater Charlie Miller N/A
The Cyber Arms Race Live feed from the Security Theater Mikko Hypponen N/A