DeepSecVienna 2018 Nov. 27, 2018 to Nov. 28, 2018, Vienna, Austria
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote: We're All Gonna Die | Peter Zinn | Let’s kick off this conference with a frank frolic into the future. What better way ... | |
Uncovering Vulnerabilities in Secure Coding Guidelines | Fernando Arnaboldi | Several government-related and private organizations provide guidance on how to improve the security of existing ... | |
Without a Trace – Cybercrime, Who are the Offenders? | Edith Pospisil | Cybercrime is a worldwide and diverse phenomenon, which needs multidisciplinary and global prevention and intervention ... | |
Keynote: Automatic Exploitation - The DARPA Cyber Grand Challenge, what came after, and what is next | Kevin Borgolte | The automatic exploitation of vulnerabilities has long been a holy grail for software security.However, even ... | |
IoD - Internet of Dildos, a Long Way to a Vibrant Future | Werner Schober | In recent years the internet of things has slowly creeped into our daily life and ... | |
Moving Money: Inside the Global Watchlist for Banking across Borders | Jasmin Wills | It's a rare glimpse of an otherwise tightly guarded datastore - and it's worrying: many ... | |
How Android's UI Security is Undermined by Accessibility | Eric Leblond , Anatoli Kalysch | Android's accessibility API was designed to assist users with disabilities, or temporarily preoccupied users unable ... | |
Who Watches the Watcher? Detecting Hypervisor Introspection from Unprivileged Guests | Tomasz Tuzel | Over the last decade we have seen a rapid rise in virtualization-based tools in which ... | |
The Swift Language from a Reverse Engineering Perspective | Malte Vincent | Over the last decade, mobile devices have taken over the consumer market for computer hardware. ... | |
Efail and other Failures with Encryption and E-Mail | Hanno Böck | The Efail bug against encrypted e-mails showed a variety of problems with the interaction of ... | |
Defense Informs Offense Improves Defense: How to Compromise an ICS Network and How to Defend It | Joe Slowik | ICS attacks have an aura of sophistication, high barriers to entry, and significant investment in ... | |
Library and Function Identification by Optimized Pattern Matching on Compressed Databases | Paul Coggin , Maximilian Von Tschirschnitz , Benjamin Ridgway | The goal of library and function identification is to find the original library and function ... | |
Kernel-Assisted Debugging of Linux Applications | Tobias Holl , Philipp Klocke , Fabian Franzen | On Linux, most---if not all---debuggers use the ptrace debugging API to control their target processes. ... | |
New Attack Vectors for the Mobile Core Networks | Dr. Silke Holtmanns | Structure of the talk:- Introduction & background- Introduction to interconnection network (What is it, how ... | |
Injecting Security Controls into Software Applications | Katy Anton | SQL Injection was first mentioned in a 1998 article in Phrack Magazine. Twenty years later, ... | |
Offpath Attacks Against PKI | Markus Brandt | The security of Internet-based applications fundamentally rely on the trustworthiness of Certificate Authorities (CAs). We ... | |
Blinding the Watchers: The Growing Tension between Privacy Concerns and Information Security | Mark Baenziger | This talk explores the growing tension between recent changes to customer and employee expectations of ... | |
Open Source Network Monitoring | Paula Garrido | I'd like to offer an introduction into Network System Monitoring using different open tools available ... | |
Attacks on Mobile Operators | Aleksandr Kolchanov | I'd like to talk about telecom security.My research contains information about security of mobile operators: ... | |
Everything is connected: how to hack Bank Account using Instagram | Aleksandr Kolchanov | Attacks on IVR systems and call centers of bank are interesting and funny, but sometimes ... | |
How to Communicate about IT Security without Getting the Cybers | Hauke Berghoff | A long long time ago any results from security research were mainly communicated via message ... | |
Cracking HiTag2 Crypto - Weaponising Academic Attacks for Breaking and Entering | Kevin Sheldrake | HiTag2 is an RFID technology operating at 125KHz. It is distinguished from many others in ... | |
A Tour of Office 365, Azure & SharePoint, through the Eyes of a Bug Hunter | Dr.-ing Ashar Javed | Cross-Site Scripting (XSS) outbreak has started almost twenty years ago and since then it has ... | |
Project Introduction: Data over Sound - Risks and Chances of an emerging Communication Channel | Matthias Zeppelzauer | The ultrasonic frequency band represents a novel and so far hardly used channel for the ... | |
Building your Own WAF as a Service and Forgetting about False Positives | Juan Berner | When a Web Application Firewall (WAF) is presented as a defensive solution to web application ... | |
Information, Threat Intelligence, and Human Factors | John Bryk | • There’s a huge difference between threat data, information, and intelligence. Understanding the difference is ... | |
Pure In-Memory (Shell)Code Injection in Linux Userland | Reenz0h | A lot of research has been conducted in recent years on performing code injection in ... | |
RFID Chip Inside the Body: Reflecting the Current State of Usage, Triggers, and Ethical Issues | Ulrike Hugl | Chipping humans can be seen as one of the most invasive biometric identification technologies. RFID ... | |
Discussion: Mobile Network Security | Deepsec Guardian | DeepSec 2018 focuses heavily on mobile security, especially mobility. As part of the outstanding group ... | |
DNS Exfiltration and Out-of-Band Attacks | Nitesh Shilpkar | The Domain Name Server or DNS is one of the most fundamental parts of the ... | |
Global Deep Scans - Measuring Vulnerability Levels across Organizations, Industries, and Countries | Luca Bräunlein | We introduce global deep scans that provide insights into the security hygiene of all organizations ... | |
Leveraging Endpoints to Boost Incident Response Capabilities | Francisco Galian , Mauro Silva , Jules Massey | In our day to day we constantly see how most of the organisations fail to ... | |
Drones, the New Threat from the Sky | Dom (d#fu5e) Brack | I will talk about drones. Drone risks and countermeasures. Drones have become an inherent risk ... | |
Security as a Community Healthcare: Helping Small Non-Profit Organisations Stay Secure | Eva Blum-dumontet | This talk will look at the way Privacy International has relied on its experience from ... | |
Anomaly Detection of Host Roles in Computer Networks | Yury Kasimov | Detecting malware infections is one of the most challenging tasks in modern computer security. Although ... | |
Can not See the Wood for the Trees - Too Many Security Standards for Automation Industry | Frank Ackermann | Plant operators and manufacturers are currently faced with many challenges in the field of automation. ... | |
Mapping and Tracking WiFi Networks / Devices without Being Connected | Caleb Madrigal | Sure, WiFi hacking has been around for a while, and everyone knows about tools like ... | |
Manipulating Human Memory for Fun and Profit | Stefan Schumacher | The human memory is very volatile and not really trustworthy. Judges, interrogators and scientists know ... |