Troopers 2014 March 19, 2014 to March 20, 2014, Heidelberg, Germany

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote George Bakos N/A
Security and SDN – A perfect fit or oil-and-water? Ivan Pepelnjak Software-defined networks have quickly become one of the most overhyped networking concepts, with vendors promising ...
Security through Obscurity, powered by HTTPS Sebastian Schrittwieser , Peter Frühwirt Applications on modern smartphone operating systems are protected against analysis and modification through a wide ...
Injecting evil code in your SAP J2EE systems: Security of SAP Software Deployment Server Alexander mikhailovich Polyakov , Dimitry chastuhin Why break critical systems themselves when we can attack Deployment Server: the core from which ...
Granular Trust; making it work Toby Kohlenberg Over the last 5 years the concept of using dynamic or granular trust models to ...
How to Own your Heart – Hacking Medical Devices Florian Grunow In the last few years we have seen an increase of high tech medical devices, ...
Bro: A Flexible Open-Source Platform for Comprehensive Network Security Monitoring Robin Sommer Bro is a highly flexible open-source monitoring platform that is today protecting some of the ...
OSMOSIS – Open Source Monitoring Security Issues Christian Sielaff , Daniel Hauenstein By trying to emulate a real world environment, we have deliberately chosen software solutions, which ...
Risks in hosted SAP Environments Andreas Wiegenstein , Xu Jia Many SAP customers have outsourced the operation of their SAP systems in order to save ...
Get Over It: Privacy is Good for Security Rob Lee Over the last year government leaks regarding nation-state digital espionage and surveillance have made the ...
What Happens In Windows 7 Stays In Windows 7 Marion Marschalek , Joseph Moti Synopsis: Systems evolve over time, patches are applied, holes are fixed, new features are added. ...
Easy Ways To Bypass Anti-Virus Systems Attila Marosi All IT security professionals know that antivirus systems can be avoided. But few of them ...
20 Ways past Secure Boot Job de Haas This talk presents an overview of all things that can go wrong when developers attempt ...
Psychology of Security Stefan Schumacher IT Security is often considered to be a technical problem. However, IT Security is about ...
Implementing an USB Host Driver Fuzzer Daniel Mende The Universal Serial Bus (USB) can be found everywhere these days, may it be to ...
SAP’s Network Protocols Revisited Martin Gallo What network protocols does my SAP system use? Are those services secure from a network ...
SAP BusinessObjects Attacks: Espionage and Poisoning of Business Intelligence platforms Will Vandevanter , Juan Perez-etchegoyen Business executives make their strategic decisions and report on their performance based on the information ...
Vulnerability Classification in the SaaS Era Noam Liran This talk we will thoroughly analyze two major SaaS vulnerabilities that were found by Adallom ...
How to Work towards Pharma Compliance for Cloud Computing– What Do FDA and Similar Regulations Mean for Your (Cloud) IT Delivery Organisation? Martijn Jansen Today, for life-sciences or consumer goods manufacturers/food/drug companies’ regulatory compliance is quite a heavy burden ...
Compromise-as-a-Service: Our PleAZURE. Matthias Luft , Felix Wilhelm This could be a comprehensive introduction about the ubiquity of virtualization, the essential role of ...
Making (and Breaking) an 802.15.4 WIDS Ryan Speers , Sergey Bratus , Javier Vazquez Real-world security-critical systems including energy metering and physical security monitoring are starting to rely on ...
Modern smartphone forensics: Apple iOS: from logical and physical acquisition to iCloud backups, document storage and keychain; encrypted BlackBerry backups (BB 10 and Olympia Service) Vladimir Katalov Apple iCloud Backups: there are various methods to perform data acquisition from iOS devices: logical, ...
Hiding the breadcrumbs: Anti-forensics on SAP systems Will Vandevanter , Juan Perez-etchegoyen SAP systems are running our most critical business processes. SAP security has been increasing over ... IncludeThinkstScapes
Medical Device Cyber Security: The First 164 Years Kevin Fu Today, it would be difficult to find medical device technology that does not critically depend ...
Security Analysis of the Computer Architecture: What a software researcher can teach you about your computer Rodrigo Rubira Branco This talk will clarify different aspects of a modern computer architecture, with emphasis in the ...
The Three Billion Dollar App Vladimir Wolstencroft Mobile social applications are proliferating through our society and are starting to take the lime ...