SecurityFest 2017 June 1, 2017 to June 1, 2017, gothenburg,sweden
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
KEYNOTE: Of Unicorns and Replicants | Steve Lord | Early in the 21st Century, connected sensor evolution advanced into the economic bubble phase – ... | |
Don’t Get Caught Em-bed: Finding and Preventing Vulns at its Lowest Level | Aaron Guzman | It’s no secret that embedded systems surround and control our daily lives. Embedded device and ... | |
How to convince a malware to avoid us? | Csaba Fitzl | Malware authors try to hide from malware analysts or security researchers with plenty of techniques. ... | |
DNS hijacking using cloud providers – No verification needed | Frans Rosén | A few years ago, Frans and his team posted an article on Detectify Labs regarding ... | |
When all else fails – Reverse engineering with determination | Calle Svensson | There is a Swedish proverb, “All methods are good except for the bad ones” which ... | |
Self XSS: we’re not so different, you and I | Mathias Karlsson | Self-XSS is a type of XSS defined by the fact that it only affects the ... | |
Internet of Scientific Curiosity – What I found out using my home and body as an IoT test lab | Emma Lilliestam | Internet of Things is a toolbox, and as any tool it can be used for ... | |
SWEMAL – automated malware analysis on the whole Swedish web | Ulf Lundin | This software visits all domains on the Swedish web and examines the HTML/JS code for ... |