IT-DefenseStuttgart 2019 Feb. 6, 2019 to Feb. 8, 2019, Stuttgart, Germany

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
When I grow up Karla Burnett As security engineers, we like to think that the code we write is fairly secure. ...
I know what you printed last summer: network printers as an element of uncertainty Jens Müller The paperless office has been predicted for decades. Still, a lot of companies and private ...
Irrationalities of our Risk Perception – Fascination of Behavioral and Purpose Economy Prof. Ankenbrand When is risk a risk? And how do we perceive risks? In order to better ...
Compromising Online Accounts by Cracking Voicemail Systems Martin Vigo Voicemail systems have been with us since the 80s. They played a big role in ...
Tor: Internet privacy in the age of big surveillance Roger Dingledine Tor is a free-software anonymizing network that helps people around the world use the Internet ...
Cybersecurity for Renewable Energy Control Systems Dr. Jason Staggs Electric utilities across the world are investing heavily in renewable energy generation. Renewable energy promises ...
Through the Eyes of the Attacker: Designing Embedded Systems Exploits for Industrial Control Systems Marina Krotofil Industrial Control Systems (ICS) threat landscape has changed dramatically over the past few years. New ...
Rooting Routers Using Symbolic Execution Mathy Vanhoef This talk explains how we discovered various vulnerabilities in implementations of WPA2’s 4-way handshake. This ...
The State of AI-assisted Fuzzing & Program Analysis Clarence Chio Fuzzing and program analysis are a security professional’s bread and butter. The faster we are ...
News on Spectre, Meltdown and the like – systematization of x86 processor security Philipp Kollenda Commercially available x86 processors are an essential component of the trusted computing base in millions ...