SecT 2014 Sept. 18, 2014 to Sept. 19, 2014, Fribourg,switzerland
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote | Felix "fx" Lindner | N/A | |
(To Be Most Neighborly Announced) | Travis Goodspeed | N/A | |
Thunderbolt and Lightning, very very frightening | Loukas Kalenderidis | People keep talking about Thunderbolt DMA attacks as though they're a foregone conclusion. Thus far, ... | |
Cats and Dogs Living Together: Langsec Is Also About Usability | Meredith L. Patterson | One premise underlies every argument about usability and security that has ever raged: "Secure software ... | |
Going deeper on aviation security | Hugo Teso | This presentation will explain and show how to remotely attack and take control of some ... | |
How I Evolved Your Fuzzer | Fabien Duchene | Fuzzing is the automatic creation and evaluation of inputs for discovering vulnerabilities. Traditional undirected black-box ... | |
Attacking Mobile Broadband Modems Like A Criminal | Andreas Lindh | While there has certainly been some interesting research into the security of mobile broadband modems, ... | |
IOT: How I Hacked My Home | David Jacoby | It is very often we hear about these over hyped new terms in the IT-security ... | |
A Random Talk (or how to attack randomly) | Jussi | This presentation goes through some memories from my vacation to the world of internet gaming, ... | |
Detecting the Heartbleed vulnerability | Antti Karjalainen | Presented by the engineer who initially detected the Heartbleed vulnerability, this talk will provide you ... | |
Memory Forensics and Security Analytics : Detecting Unknown Malware | Fahad Ehsan | This presentation will show how open source tools can be used to detect ‘Unknown’ malware ... | |
For Want of a Nail | Sergey Bratus , Meredith L. Patterson | Input parser bugs appear to be simple. For years, they've been among the best-understood bug ... | |
Unparseable Resource Locators | Karl Zetterlund | N/A | |
Route or be rooted: evolution of an often underestimated threat | Marta Janus | N/A | |
Fingerprinting signatures using interactions between cryptographic and network layers of a VPN | Anna Shubina | N/A |