t2 2015 Oct. 29, 2015 to Oct. 30, 2015, helsinki,finland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Morgan Marquis-boire It's a keynote. Morgan Marquis-Boire is a Senior Researcher at the Citizen Lab, University of ...
Forging the USB armory Andrea Barisani The availability of modern System on a Chip (SoC) parts, having low power consumption and ...
A Reasonably Safe Travel Burner Laptop Setup Georg Wicherski Physical access to computer devices at borders and in hotel room safes has always been ...
CosmicDuke: peering inside over 7 years of state-sponsored malware operations Artturi Lehtiö The summer of 2014 saw the public outing of a uniquely interesting malware family known ...
Practical Adobe Flash analysis Timo Hirvonen Flash files can be divided into two categories: protected and unprotected. Analyzing unprotected Flash files ...
Put on your tinfo_t hat if you're my type Miau Biz The IDA Pro APIs for interacting with type information are full of opportunities (horrible problems). ...
Windows kernel fuzzing Nils Attackers often rely on Windows kernel vulnerabilities to break out of application sandboxes and escalate ...
If attackers think in graphs, why can't we? Olleb Microsofts John Lambert said "Defenders think in lists. Attackers think in graphs". If attackers can ...
Physical penetration testing Walter Belgers Your assignment is going great. You're past the reception desk, thanks to your social engineering ...
Washing away the snake oil of threat intelligence David Chismon "Threat Intelligence" is at peak hype currently and is being seen by many organisations as ...
Physical Side Channel Attacks on PCs Lev Pachmanov Can secret information be extracted from personal computers by measuring their physical properties from the ...
LTE (in) Security Ravishankar Borgaonkar , Altaf Shaik Most of the traditional IMSI catcher attacks would not work against LTE (4G) mobile phones. ...
Practical exploit development for AVR-based devices. Alexander Bolshev , Boris Ryutin Today, one can find many devices based on AVR microcontrollers. The range of such devices ...