Nullcon 2016 March 10, 2016 to March 12, 2016, goa,india

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
How to build Big Brother: Critical Vulnerabilities in 3G/4G Modems Yunusov Timur This research was born from the presentation "#root via SMS" and offer a summary of ...
Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day attacks Vipul Sawant , Pallav Jakhotiya Threat landscape is changing very rapidly and we are seeing more and more targeted attacks. ...
Sandbox detection: Abuse, test, leak Zoltan Balazs Manual processing of malware samples became impossible years ago. Sandboxes are used to automate the ...
Keynote Jaya Baloo , Roland Cloutier Jaya Baloo has been working internationally in Information Security for fifteen years. Her focus has ...
Automatic Automotive Hacking Craig Smith I will be demonstrating how hacking vehicles is getting easier. Security research and tools are ...
DMR Protocol Travis Goodspeed This lecture concerns the Tytera MD380, a handheld transceiver used for the Digital Mobile Radio ...
What Google knows about you and your devices, and how to get it Vladimir Katalov With cloud forensics picking up, Google becomes one of the most important sources of information ...
Social Engineering Man & the Machine or Social Engineering Village Neelu Tripathy All contestants are required to carry a laptop/PC to participate in the CTF to be ...
Abusing Software Defined Networks (Part Two): Using the SDN-Toolkit to Test Your Software Defined Network Gregory Pickett I think that we can all agree that Software Defined Networks are awesome. But how ...
Million Dollar Baby: Towards ANGRly conquering DARPA CGC Aravind Machiry A Dozen Years of Shellphish: From DEFCON to the DARPA Cyber Grand Challenge (CGC) How ...
Physical Lock Security Amey Gat , Swapnil Wadwalkar The locks used around us today are mass produces and widely exploitable. Right from your ...
Application Security Workshop Amit Ashbel This three part workshop designed for AppSec Professionals and developers covers Application Security concepts including ...
An Abusive Relationship with AngularJS – About the Security Adventures with the 'Super-Hero' Framework Mario Heiderich Some voices claim that "Angular is what HTML would have been if it had been ...
Show Me the Data: Analyzing Security Trends Across 100 Companies Clint Gibler As security professionals, we’re aware of the types of security issues our company faces and ...
Let's Play Doctor: Practical OS X Malware Detection & Analysis Patrick Wardle “I think my Mac has a virus”...now what? When a Windows PC gets infected there ...
Making Machines think about security for fun and profit Rahul Sasi It is obvious and clear that traditional web application security scanners are incapable of finding ...
Attacking and defending healthcare - EMR solutions Anirudh Duggal Anirudh Duggal is a cyber security enthusiast and works with Philips healthcare on securing medical ...
Hardsploit project : All-In-One Tool for Hardware Security Audit Julien Moinard I²C, JTAG, SPI, PARALLEL, UART – Today’s electronic devices, connected or not to the internet, ...
The Age of Cyber Threats Anudeep Kumar , Ajitest Roy Chowdhury From the first amateur hackers in the 80s (e.g. The Brain) till 2016 when international ...
Privacy leaks on 4G-LTE networks Altaf Shaik Despite having strong security features, 4G-LTE technology booms with several vulnerabilities. This talks exactly presents ...
Hitchhiker's guide to hacking Industrial Control systems Arun Mane Todays new gen attacks and malwares have been targeting ICS systems causing huge monetary and ...
Automated Mobile Application Security Assessment with MobSF Ajin Abraham Mobile Application market is growing like anything and so is the Mobile Security industry. With ...
Attacking Radio: A hands on workshop Yashin Mehaboobe Radio communication has existed for more than a century. It is currently used for purposes ...