phdays 2014 May 21, 2014 to May 22, 2014, Moscow,Russia
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Smart TV Insecurity | Donato Ferrante , Luigi Auriemma | At the beginning TV were just supposed to be TV. They were used to make ... | |
Mobile Network Attack Evolution | Karsten Nohl | Mobile networks should protect users on several fronts: Calls need to be encrypted, customer data ... | |
SCADA Strangelove: Hacking in the Name | Positive Technologies | The SCADA Strangelove team will present a report on industrial control systems for the second ... | |
Impressioning Attacks: Opening Locks with Blank Keys | Deviant Ollam , Babak Javadi , Keith Howell | Impressioning is the art of fabricating a working key for a lock using only a ... | |
Misuse of "Secure" Protocols and Their Exploitation | Vladimir Dubrovin | It’s a common situation when protocols designed for information protection are used without understanding their ... | |
Give Me Your Data! | Dave Chronister | We hear news stories every day about malicious hackers compromising the sensitive data of corporations, ... | |
ID and IP Theft with Side-Channel Attacks | David Oswald | Side-channel analysis (SCA) is a powerful tool to extract (cryptographic) secrets by observing physical properties ... | |
Development of Techniques of Exploit Generation on the Basis of Binary Code Analysis | Andrey Fedotov , Vadim Kaushan | The report covers approaches to generation of code injection exploits for binary programs with crashdump ... | |
Botnet History Illustrated by BlackEnergy 2 | Maria Garnaeva , Sergey Lozhkin | The report touches upon botnet history exemplified by BlackEnergy 2. Its early life was marked ... | |
Are Specialized Solutions a Cure-all? Discussing MDM, BYOD, etc. | Kirill Kertsenbaum | New information security products and solutions (BYOD, MDM, NGF, WAF, APT, etc.) appear every year. ... | |
Problems of Automated Generation of Exploits on the Basis of Source Code | Sergey Plekhov , Alexey Moskvin | Automated generation of exploits and source code analysis have their intricacy. For example, using only ... | |
Internet of Things Cryptography | Alexey yevgenievich Zhukov | More and more devices get connected to the World Wide Web every year. An ordinary ... | |
Crypto Hot Cases – One Year Backward | Eric Filiol | This talk considers the recent history of cryptography and its control by the Western countries ... | |
TPM 2.0 Security | Oleg Verner | These days vendors add built-in Trusted Platform Module (TPM) chips to almost every computer, especially ... | |
Threats to Control Systems of Contemporary Electric Substations | Maxim Nikandrov | The talk analyzes real-life cyber security incidents and risks in control systems of contemporary electric ... | |
Visual Analytics on Guard of Information Security Authors | Igor Kotenko , Yevgeniya Novikova | Methods of visual analytics significantly simplify a security administrator’s work, since these methods involve intelligent ... | |
Reverse Engineering Automation Author | Anton Dorfman | While reverse engineering, a researcher should perform many routine tasks in order to find out ... | |
My Journey Into 0-Day Binary Vulnerability Discovery in 2014 Author | Alisa Esage | While the IT security research hotspot migrates constantly towards new technologies, the demand for binary ... | |
How to Intercept a Conversation Held on the Other Side of the Planet Authors | Sergey Puzankov , Dmitry Kurbatov | Lately, phone communication records can be found in the Internet and even be heard on ... | |
PHP Object Injection Vulnerability in WordPress an Analysis | Tom Van Goethem | With approximately 19% of the web running on WordPress, it comes as no surprise that ... | |
Side Channel Analysis: Practice and a Bit of Theory | Ilya Kizhvatov | The proposed talk is about side channel analysis of secure devices. This topic is not ... | |
OS X Drivers Reverse Engineering Author | Egor Fedoseev | It is a technical report on the peculiar features of OS X driver analysis that ... | |
In the Middle of Printers: (In)security of Pull Printing Solutions | Jakub Kałużny | Big corporations and financial institutions need secure pull printing services which guarantee a proper encryption, ... | |
Cracking Pseudorandom Sequences Generators in Java Applications | Sergey Soldatov , Mikhail Egorov | Modern applications widely use random sequences for security related tasks: encryption keys, authentication challenges, session ... | |
Intercepter-NG: The New-Generation Sniffer | Alexander Dmitrenko | Ares The report is devoted to a unique toolkit named Intercepter-NG developed in Russia. Today ... |