HackLu 2015 Oct. 20, 2015 to Oct. 22, 2015, parcHotel,Luxembourg

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote - Unpatchable: Living with a Vulnerable Implanted Device Marie Moe My life depends on the functioning of a medical device, a pacemaker that generates each ...
Keynote - Internet of Tchotchke Paul Rascagneres In this presentation the author will describe his journey into the domain of reverse engineering ...
Trusting Files Formats: Illusions or Reality? Ange ( ange4771 ) Albertini What is our biggest fear when we double-click an icon, when our system opens an ...
How Mobile Applications Are Redefining Information Controls Inside of Iran Mahsa Alimardani As Internet users increasingly connect to the Internet through smartphones, this has transformed Iran’s Internet ...
Geek usages for your Fitbit Flex tracker Axelle Apvrille Fitness Flex is a fitness wristband which records your fitness activity: walking, running - and ...
Key-Logger, Video, Mouse - How to turn your KVM into a raging key-logging monster Lior Oppenheim , Yaniv Balmas Key-Loggers are cool, really cool. It seems, however, that every conceivable aspect of key-logging has ...
Forging the USB armory Andrea Barisani , Daniele Bianco The availability of modern System on a Chip (SoC) parts, having low power consumption and ...
Keys? Where we’re going, we don’t need keys Damien Cauquil Smartlocks are the new way of securing doors by replacing the old mechanical locks by ...
Draw me a Local Kernel Debugger Samuel Chevet , Clément Rouault Local Kernel Debugging is the ability to perform kernel-mode debugging on a single computer. In ...
Security of Virtual Desktop Infrastructures: from great concepts to bad surprises Maxime Clementz , Simon Petitjean Virtual Desktop Infrastructure hosts users’ desktop environments on remote servers which are accessed over a ...
Binary Constraint Solving with LLVM Sophia D’antoine This talk will show how to perform a full chain control flow attack against a ...
Advances in Secure Messaging Protocols Frederic Jacobs Along with the Snowden revelations, there’s been a surge of interest in end-to-end security for ...
How not to build an electronic voting system Quentin Kaiser Back in 1994, Belgium was one of the first European country to push for the ...
Totally Spies! Paul Rascagneres , Joan Calvet , Marion Marschalek In March 2014 a set of slides were leaked from the Communications Security Establishment Canada ...
HackingTeam - how they infected your Android device by 0days Attila Marosi There is no need to make a long introduction when speaking about the famous Remote ...
A Collective View of Current Trends in Criminal Hosting Infrastructures Dhia Mahjoub From new exploits and antivirus evasion techniques to traffic direction services and compromised data reselling: ...
How digital forensics met threat intelligence Ronan Mouchoux , Thomas Chopitea Blue-team infosec is all about defending against an opponent. And as we all know, knowing ...
They Hate Us ‘Cause They Ain’t Us - How We Broke the Internet Netanel Rubin The InfoSec community likes to argue. From conference ethics & dress codes, through disclosure policies, ...
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers Eduardo Novella A wireless router is a networking device that enables a user to set up a ...
Security Design and High-Risk Users Eleanor Saitta Security is a property of human outcomes, not technical systems. The security community understands how ...
Stegosploit - Delivering Drive-By Exploits With Only Images Saumil Udayan Shah Stegosploit creates a new way to encode “drive-by” browser exploits and deliver them through image ...
Crema: A LangSec-Inspired Programming Language Jacob Torrey , Mark Bridgman We discuss the potential for significant reduction in size and complexity of verification tasks for ...
Why Johnny Can’t Unpack: Toward One Click Unpacking Shift Johnny is frustrated, he can’t unpack malware. Nor does his latest sandbox which his organization ...
Improving Flash Exploits Analysis Tillmann Werner Eight different zero-day vulnerabilities in Adobe Flash Player in 2015 so far, and analysts are ...
No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large Aaron Zauner Abstract—TLS is the most widely used cryptographic protocol on the Internet. While many recent studies ...
TrustZone on the USB armory (2 hours) Andrea Barisani , Daniele Bianco The workshop aims to introduce the fine details of the Freescale i.MX53 TrustZone implementation, the ...
Malcom Workshop (2 hours) Sébastien Larinier , Thomas Chopitea Malcom is an open source tool https://github.com/tomchop/malcom written in Python. This tool is used to ...
Crowdsourced Malware Triage! (2 hours) Sergei Frankoff , Sean Wilson Malware triage is an important function in any mature incident response program; the process of ...
Analyzing Malicious Office Documents (2 hours) Didier Stevens In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA ...
Dr. Honeypots or: How I Learned to Stop Worrying and Love My Enemies (4 hours) Guillaume Arcas , Lukas Rist Hack, brute, root, crash… and start again ! 100% hands-on workshop
Do it yourself ! - Technical labs Guillaume Prigent , Adrien Barchapt just implement yourself IT and SCADA network operation with metasploit framework, nmap NSE and IDS/IPS ...
Workshop BTA: an open-source Active Directory security audit framework (2 hours) Joffrey Czarny When it comes to the security of the information system, Active Directory domain controllers are, ...