phdays 2014 May 21, 2014 to May 22, 2014, Moscow,Russia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Smart TV Insecurity Donato Ferrante , Luigi Auriemma At the beginning TV were just supposed to be TV. They were used to make ...
Mobile Network Attack Evolution Karsten Nohl Mobile networks should protect users on several fronts: Calls need to be encrypted, customer data ...
SCADA Strangelove: Hacking in the Name Positive Technologies The SCADA Strangelove team will present a report on industrial control systems for the second ...
Impressioning Attacks: Opening Locks with Blank Keys Deviant Ollam , Babak Javadi , Keith Howell Impressioning is the art of fabricating a working key for a lock using only a ...
Misuse of "Secure" Protocols and Their Exploitation Vladimir Dubrovin It’s a common situation when protocols designed for information protection are used without understanding their ...
Give Me Your Data! Dave Chronister We hear news stories every day about malicious hackers compromising the sensitive data of corporations, ...
ID and IP Theft with Side-Channel Attacks David Oswald Side-channel analysis (SCA) is a powerful tool to extract (cryptographic) secrets by observing physical properties ...
Development of Techniques of Exploit Generation on the Basis of Binary Code Analysis Andrey Fedotov , Vadim Kaushan The report covers approaches to generation of code injection exploits for binary programs with crashdump ...
Botnet History Illustrated by BlackEnergy 2 Maria Garnaeva , Sergey Lozhkin The report touches upon botnet history exemplified by BlackEnergy 2. Its early life was marked ...
Are Specialized Solutions a Cure-all? Discussing MDM, BYOD, etc. Kirill Kertsenbaum New information security products and solutions (BYOD, MDM, NGF, WAF, APT, etc.) appear every year. ...
Problems of Automated Generation of Exploits on the Basis of Source Code Sergey Plekhov , Alexey Moskvin Automated generation of exploits and source code analysis have their intricacy. For example, using only ...
Internet of Things Cryptography Alexey yevgenievich Zhukov More and more devices get connected to the World Wide Web every year. An ordinary ...
Crypto Hot Cases – One Year Backward Eric Filiol This talk considers the recent history of cryptography and its control by the Western countries ...
TPM 2.0 Security Oleg Verner These days vendors add built-in Trusted Platform Module (TPM) chips to almost every computer, especially ...
Threats to Control Systems of Contemporary Electric Substations Maxim Nikandrov The talk analyzes real-life cyber security incidents and risks in control systems of contemporary electric ...
Visual Analytics on Guard of Information Security Authors Igor Kotenko , Yevgeniya Novikova Methods of visual analytics significantly simplify a security administrator’s work, since these methods involve intelligent ...
Reverse Engineering Automation Author Anton Dorfman While reverse engineering, a researcher should perform many routine tasks in order to find out ...
My Journey Into 0-Day Binary Vulnerability Discovery in 2014 Author Alisa Esage While the IT security research hotspot migrates constantly towards new technologies, the demand for binary ...
How to Intercept a Conversation Held on the Other Side of the Planet Authors Sergey Puzankov , Dmitry Kurbatov Lately, phone communication records can be found in the Internet and even be heard on ...
PHP Object Injection Vulnerability in WordPress an Analysis Tom Van Goethem With approximately 19% of the web running on WordPress, it comes as no surprise that ...
Side Channel Analysis: Practice and a Bit of Theory Ilya Kizhvatov The proposed talk is about side channel analysis of secure devices. This topic is not ...
OS X Drivers Reverse Engineering Author Egor Fedoseev It is a technical report on the peculiar features of OS X driver analysis that ...
In the Middle of Printers: (In)security of Pull Printing Solutions Jakub Kałużny Big corporations and financial institutions need secure pull printing services which guarantee a proper encryption, ...
Cracking Pseudorandom Sequences Generators in Java Applications Sergey Soldatov , Mikhail Egorov Modern applications widely use random sequences for security related tasks: encryption keys, authentication challenges, session ...
Intercepter-NG: The New-Generation Sniffer Alexander Dmitrenko Ares The report is devoted to a unique toolkit named Intercepter-NG developed in Russia. Today ...