Insomni'Hack 2019 March 21, 2019 to March 22, 2019, Geneva, Switzerland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Federal Intelligence Service: How We Help To Protect Switzerland Against Serious Cyber Threats Mauro Vignati The Swiss Federal Intelligence Service is mainly focusing on APTs. This presentation is a “Behind ...
Growing Hypervisor 0day with Hyperseed Shawn Denbow Virtualization technology is progressively becoming the authority on which platform security is built and clouds ...
The way from App to Brain: attack surfaces of smart medical infrastructure By Denis Makrushin The concept of “SCADA for human” is central in focus of modern medicine. The realization ...
The Evolution of Cloud Threats Paolo Passeri Organizations are increasingly moving to the cloud to reduce costs and enable collaboration between partners, ...
Spyware, Ransomware and Worms. How to prevent the next SAP tragedy Jordan Santarcieri Is not a secret that SAP is a market leader and one of the principal ...
Building a flexible hypervisor-level debugger Mathieu Tarral Virtual Machine Introspection is a technique which leverages the hypervisor to allow the virtual machine ...
SD-WAN - Yet Another Way to Unsafe Internet Denis Kolegov , Bizone Broslavsky Today, "SD-WAN" is a very hot and an attractive topic. Software-defined WAN (SD-WAN) is a ...
Security Analysis on the Attack Surface of Blockchain Client Chen Wang Security Analysis on the Attack Surface of Blockchain ClientSince 2017, Tencent Zhanlu Lab started to ...
On the Security of Dockless Bike Sharing Services Antoine Neuenschwander Starting in 2016, many bike sharing services emerged in larger Asian cities, flooding the streets ...
Analyzing a Portable Wireless Storage Device From Zero to Remote Code Execution Qinghao Yuan My Passport Wireless Pro is a portable wireless WIFI storage device designed by the famous ...
What every (IT | Security) Professional should know about the dark web Mischa Peters Turn on the nightly news or your favourite TV drama and you’re bound to hear ...
Let's hack the IoT Hub with Pwnhub dudes: IoT Hub Exploitation and countermeasure Jisub Kim , Kanghyun Choi With the advent of the Internet of Things, our daily life is becoming more convenient. ...
Keynote: Medieval Castles and Modern Servers Christian Folini We have been building castles and fortifications for thousands of years. Many of them were ...
These are the Droids you are looking for - practical security research on Android Elena Kovakina In case you haven’t noticed, Android is the world’s most used OS these days. With ...
Sneaking Past Device Guard Philip Tsukerman Device Guard (or WDAC) Is an application whitelisting feature on Windows 10 systems that allows ...
Intelligence-driven Red Teaming Peter Hladký Cyber security breaches are repeatedly placed among the top risks by governments and organizations in ...
Nikita Stupin None
Turning your BMC into a revolving door: the HPE iLO case Alexandre Gazet , Fabien Perigaud (@0xf4b) , Joffrey Czarny (@_sn0rky) Unmonitored and unpatched BMC (remote administration hardware feature for servers) are an almost certain source ...
NSX-T Architecture & Benefits Erik Bussink VMware NSX-T is the network virtualization platform for the software-defined data center (SDDC). This session ...
Betrayed by the Android User Interface: Why a Trusted UI Matters Yanick Fratantonio In the last few years, the Android platform has gone through a lot of changes ...
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses Martijn Bogaard Secure Boot is widely deployed in modern embedded systems and an essential part of the ...
Digitalisation demands defensive action Daniel Caduff Increasing levels of IT penetration and networking in almost all areas of life opens up ...
Cryptocurrency mobile malware Axelle Apvrille On Windows, cryptojacking has become a big issue. It generates important revenues for their authors: ...
Threat Hunting Research Methodology: A Data Driven Approach Roberto Rodriguez Threat hunting as a process is still being defined for many organizations across various industries. ...
Addressing privacy: GDPR, Cloud, and You Chris Esquire This talk addresses how GDPR affects businesses that operate globally and utilize cloud technology from ...
How to investigate iOS devices Paul Rascagneres In the last few months, Cisco Talos had to investigate iOS malware. It is not ...
Dear Blue Team: Forensics Advice to Supercharge your DFIR capabilities Joe Gray In an age where data breaches and malware infections are quickly becoming the norm, we ...
From the cloud to the internal network – Offense vs Defense Snir Ben-shimol More companies are moving their most critical assets to the cloud, enabling new technologies, frameworks ...
Wake up Neo: detecting virtualization through speculative execution Innokentii Sennovskii There has been several Speculative Execution vulnerabilities allowing to read privileged data from kernel mode, ...
Exploits in Wetware Robert Sell Robert will discuss his third place finishes and experiences at the Defcon 2017 and 2018 ...