troopers 2016 March 16, 2016 to March 17, 2016, heidelberg,germany
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Opening Keynote | Ben Zevenbergen | N/A | |
Hiding your White-Box Designs is Not Enough | Philippe Teuwen | Although all current scientific white-box publications are academically broken, there is still a large number ... | |
Mind The Gap - Exploit Free Whitelisting Evasion Tactics | Casey Smith | More and more entities are deploying Application Whitelisting to prevent malware and detect sophisticated intruders. ... | |
Patch me if you can | Sebastian Schinzel , Andreas Wiegenstein , Damian Poddebniak | This talk discusses a number of severe security issues in SAP's patch process discovered in ... | |
Attacking Next-Generation Firewalls | Felix Wilhelm | "Next-Generation" firewalls provide functionality well beyond the traditional filtering capabilities. They offer deep protocol inspection, ... | |
Towards a LangSec-aware SDLC | Jacob Torrey | The keynote of TROOPERS'15 by Prof. Sergey Bratus highlighted the findings of language-theoretical security (LangSec) ... | |
Preventing vulnerabilities in HANA-based deployments | Juan Perez-etchegoyen , Nahuel Sanchez | Companies nowadays are choosing in between on-premise, cloud and hybrid deployment models. The common factor ... | |
QNX: 99 Problems but a Microkernel ain't one! | Alex Plaskett , Georgi Geshev | Cars, Turbines, Safety Critical Systems and consumer devices (phones) all run QNX, however, very little ... | |
Cloud Seeding or Finding weird machines in the cloud crowd sourced economy. | Graeme Neilson , Vladimir Wolstencroft | Our sharing economy is defining many aspects of our lives, how we travel, order food, ... | |
An easy way into your multi-million dollar SAP systems: An unknown default SAP account | Joris Vis | Fortunately more and more SAP customers start securing their business critical SAP infrastructure after many ... | |
unrubby: reversing without reversing | Richo Healey | Obfuscating code is typically the domain of native code, or at least statically dispatched bytecode ... | |
Imma Chargin Mah Lazer - How to protect against (D)DoS attacks | Oliver Matula | Distributed Denial of Service (DDoS) attacks have been transformed into a social activity by easy-to-use ... | |
Thanks SAP for the vulnerabilities. Exploiting the unexploitable | Alexander mikhailovich Polyakov , Dmitry Chastuhin | Bla-blah-blah SAP. Bla-blah-blah big companies. Bla-blah-blah hack multi-million dollar systems. This is how typical SAP ... | |
I Have the Power(View): Offensive Active Directory with PowerShell | Will Schroeder | Active Directory has been covered from a system administration perspective for as long as it ... | |
Learn about the enemy – How to profile national APT hacking group | Jinwook Chung , Moonbeom Park | Every year, so many hacking incidents and cyber terrors happen in the South Korea. So, ... | |
Deep-dive into SAP archive file formats | Martin Gallo | SAP systems use of custom archive file formats in several different places, such as for ... | |
Reverse Engineering a Digital Two-Way Radio | Travis Goodspeed , Christiane Ruetten | The Tytera MD380 is handheld transceiver for the Digital Mobile Radio (DMR) protocol, also known ... | |
Crypto code: the 9 circles of testing | Jean-Philippe Aumasson | Major crypto vulnerabilities would have been detected if we had better testing methodologies and tools. ... | |
Freifunk - Building a free and open network | Ben Oswald | In many countries you can enjoy free wifi access to the internet nearly everywhere. Also ... | |
Hollywood Hacking | Adrian ( atrox ) Dabrowski | Why did it take 15 Years to finally be able to transfer a Winword file ... | |
Passive Intelligence Gathering and Analytics - It’s all Just Metadata! | Christopher Truncer | When it comes to defending our networks or operational environment, it requires more information than ... | |
Real-life Software-Defined Security | Ivan Pepelnjak | Vendors, pundits, and industry media love to talk about Software-Defined Everything, but nothing ever changes ... | |
Broadcasting your attack: Security testing DAB radio in cars | Andy Davis | Digital Audio Broadcasting (DAB) radio receivers can be found in many new cars and are ... | |
THE KINGS IN YOUR CASTLE - All the lame threats that own you but will never make you famous | Marion Marschalek , Raphaël Vinot | It is the same question being directed to audiences around the security conference scene: How ... | |
BetterCrypto: three years in | Aaron Zauner | The BetterCrypto Project started out in the fall of 2013 as a collaborative community effort ... | |
The road to secure Smart Cars: ENISA approach | Cédric Levy-bencheton | The presentation will deal with cyber security of IoT and smart cars. It will present ... | |
Rapid Radio Reversing | Michael Ossmann | Wireless security researchers have an unprecedented array of tools at their disposal today. Although Software ... | |
Attacking & Protecting Big Data Environments | Matthias Luft , Birk Kauer | In this talk we will show how to attack enterprise-grade "big data" environments, based on ... | |
Medical Device Security: Hack or Hype? | Kevin Fu | How has the field of medical device security evolved since the 2008 hack of a ... | |
The Joy of Sandbox Mitigations | James Forshaw | When researchers think of Microsoft Windows process mitigations they're likely to come up with DEP ... | |
How to Implement an SDL in a Large Company | Arne Lüdtke | Implementing an SDL Process is difficult, especially in a big company. Arne Lüdtke from Bosch ... | |
How easy to grow robust botnet with low hanging fruits (IoT) - for free | Attila Marosi | Every day there are new vulnerabilities exposed and this “malicious knowledge” can be used by ... | |
Caring for file formats | Ange ( ange4771 ) Albertini | Getting hacked is our most common fear when we open a file, but many other ... | |
Russian attack: Live demos of their steps, tools, techniques | Wayne Huang , Sun Huang | We live-demo (as an attacker) many Russian crimeware that's never been disclosed before, including tools ... |