Ruhrsec 2017 May 17, 2017 to May 18, 2017, bochum,germany
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Opening, | Marcus Niemietz | N/A | |
Keynote: How to Build Hardware Trojans, | Christof Paar | Countless systems ranging from consumer electronics to military equipment are dependent on integrated circuits (ICs). ... | |
Rowhammer Attacks: A Walkthrough Guide, | Clémentine Maurice , Daniel Gruss | In the past 2 years the so-called Rowhammer bug has caught the attention of many ... | |
Using Microarchitectural Design to Break KASLR and More, | Anders Fogh | Typically, hackers focus on software bugs to find vulnerabilities in the trust model of computers. ... | |
Teach a Man to Phish and You Feed Him for a Lifetime, | Armin Buescher | Phishing might seem like a simple attack vector relying on gullible users to happily give ... | |
Five Years of Android Security Research: the Good, the Bad, the Ugly, | Sven Bugiel | Android security and privacy research has boomed in recent years, far outstripping investigations of other ... | |
A new categorization system for Side-channel attacks on mobile devices & more, | Veelasha Moonsamy | Side-channel attacks on mobile devices have gained increasing attention since their introduction in 2007. While ... | |
The (In)Security of Automotive Remote Keyless Entry Systems (revisited), | David Oswald | Remote keyless entry (RKE) systems, usually based on so-called rolling codes, are the most widespread ... | |
Keynote 2: SSH: Beyond Confidentiality and Integrity in Practice, | Kenny Paterson | This talk presents a systematic analysis of symmetric encryption modes for SSH that are in ... | |
0-RTT Key Exchange with Full Forward Secrecy, | Tibor Jager | Reducing latency overhead while maintaining critical security guar- antees like forward secrecy has become a ... | |
Breaking and Fixing a Cryptocurrency, | Martin Grothe | Bitcoin has been hailed as a new payment mechanism, and is currently accepted by millions ... | |
Black-Box Security Analysis of State Machine Implementations, | Joeri De Ruiter | State machines play an important role when implementing any protocol. They specify which messages are ... | |
Advanced SSL/TLS Deployment Strategies, | Frederik Braun | The web has evolved from hypertext to a powerful application platform. Powerful features like Geolocation, ... | |
Secrets of the Google Vulnerability Reward Program, | Krzysztof Kotowicz | In Google VRP, we receive and process over 600 vulnerability reports a month. While the ... |