NoSuchCon 2014 Nov. 19, 2014 to Nov. 21, 2014, Paris,France

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Understanding and defeating Windows 8.1 Patch Protections: it’s all about gong fu! (part 2) Andrea Allievi Andrea Allievi is an Italian computer security researcher with over 6 years experience. He graduated ...
Cryptographic Backdooring Jean-Philippe Aumasson We describe the different classes of cryptographic backdoors, which depend on where sabotage occurs in ...
Forging the USB armory Andrea Barisani Inverse Path recently introduced the USB armory project, an open source hardware design, implementing a ...
No Such Security Anthony Zboralski Anthony Zboralski is a computer hacker who has worked as a security expert for nearly ...
Google Apps Engine security Nicolas Collignon Based on a feedback from multiple penetration tests and codes reviews, this talk answer practical ... IncludeThinkstScapes
Mimikatz Benjamin Delpy Benjamin Delpy, is a security researcher know as 'gentilkiwi'. Presented at Black Hat, Defcon, PHDays, ...
HomePlugAV PLC: practical attacks and... Sebastien Dudek Domestic Power-line Communication (PLC) devices are used to extend a LAN network as well as ...
Your Q is my Q Georgi Geshev Message Queueing concepts are well established in enterprise environments which are already known to be ...
Blended Web and Database Attacks on Real-time, In-Memory Platforms Ezequiel D. Gutesman It is well known there is a race going on in the "Big Data" arena ...
Attack on the Core Peter Hlavaty Kernel vulnerabilities was commonly used to obtain admin privileges, and main rule was to stay ...
SURPRISE TALK Alex Ionescu Alex Ionescu is the Chief Architect at CrowdStrike, Inc. Alex is a world-class security architect ...
Fuzzing and Patch Analysis: SAGEly Advice Richard Johnson Last year, in “Taint Nobody Got Time for Crash Analysis”, we presented implementations of analyses ...
Quantum computing in practice Renaud Lifchitz There are a lot of fantasies and myths about quantum computers. Do they exist? In ...
The Nitty Gritty of Sandbox Evasion Rob Rachwald With organizations facing a deluge of cyber-attacks, virtual-machine sandboxing has become a popular tool for ...
Exploitation of a hardened MSP430-based device Braden Thomas This presentation walks through the reverse-engineering and exploitation of a hardened embedded device and provides ...
Detecting BGP hijacks in 2014 Guillaume Valadon , Nicolas Vivet The main goal of this talk is to raise awareness of routing security issues by ...