Nullcon 2016 March 10, 2016 to March 12, 2016, goa,india
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
How to build Big Brother: Critical Vulnerabilities in 3G/4G Modems | Yunusov Timur | This research was born from the presentation "#root via SMS" and offer a summary of ... | |
Real-time Ingestion of security telemetry data into Hadoop distributed system to respond to 0-day attacks | Vipul Sawant , Pallav Jakhotiya | Threat landscape is changing very rapidly and we are seeing more and more targeted attacks. ... | |
Sandbox detection: Abuse, test, leak | Zoltan Balazs | Manual processing of malware samples became impossible years ago. Sandboxes are used to automate the ... | |
Keynote | Jaya Baloo , Roland Cloutier | Jaya Baloo has been working internationally in Information Security for fifteen years. Her focus has ... | |
Automatic Automotive Hacking | Craig Smith | I will be demonstrating how hacking vehicles is getting easier. Security research and tools are ... | |
DMR Protocol | Travis Goodspeed | This lecture concerns the Tytera MD380, a handheld transceiver used for the Digital Mobile Radio ... | |
What Google knows about you and your devices, and how to get it | Vladimir Katalov | With cloud forensics picking up, Google becomes one of the most important sources of information ... | |
Social Engineering Man & the Machine or Social Engineering Village | Neelu Tripathy | All contestants are required to carry a laptop/PC to participate in the CTF to be ... | |
Abusing Software Defined Networks (Part Two): Using the SDN-Toolkit to Test Your Software Defined Network | Gregory Pickett | I think that we can all agree that Software Defined Networks are awesome. But how ... | |
Million Dollar Baby: Towards ANGRly conquering DARPA CGC | Aravind Machiry | A Dozen Years of Shellphish: From DEFCON to the DARPA Cyber Grand Challenge (CGC) How ... | |
Physical Lock Security | Amey Gat , Swapnil Wadwalkar | The locks used around us today are mass produces and widely exploitable. Right from your ... | |
Application Security Workshop | Amit Ashbel | This three part workshop designed for AppSec Professionals and developers covers Application Security concepts including ... | |
An Abusive Relationship with AngularJS – About the Security Adventures with the 'Super-Hero' Framework | Mario Heiderich | Some voices claim that "Angular is what HTML would have been if it had been ... | |
Show Me the Data: Analyzing Security Trends Across 100 Companies | Clint Gibler | As security professionals, we’re aware of the types of security issues our company faces and ... | |
Let's Play Doctor: Practical OS X Malware Detection & Analysis | Patrick Wardle | “I think my Mac has a virus”...now what? When a Windows PC gets infected there ... | |
Making Machines think about security for fun and profit | Rahul Sasi | It is obvious and clear that traditional web application security scanners are incapable of finding ... | |
Attacking and defending healthcare - EMR solutions | Anirudh Duggal | Anirudh Duggal is a cyber security enthusiast and works with Philips healthcare on securing medical ... | |
Hardsploit project : All-In-One Tool for Hardware Security Audit | Julien Moinard | I²C, JTAG, SPI, PARALLEL, UART – Today’s electronic devices, connected or not to the internet, ... | |
The Age of Cyber Threats | Anudeep Kumar , Ajitest Roy Chowdhury | From the first amateur hackers in the 80s (e.g. The Brain) till 2016 when international ... | |
Privacy leaks on 4G-LTE networks | Altaf Shaik | Despite having strong security features, 4G-LTE technology booms with several vulnerabilities. This talks exactly presents ... | |
Hitchhiker's guide to hacking Industrial Control systems | Arun Mane | Todays new gen attacks and malwares have been targeting ICS systems causing huge monetary and ... | |
Automated Mobile Application Security Assessment with MobSF | Ajin Abraham | Mobile Application market is growing like anything and so is the Mobile Security industry. With ... | |
Attacking Radio: A hands on workshop | Yashin Mehaboobe | Radio communication has existed for more than a century. It is currently used for purposes ... |