RuhrSecBochum 2019 May 28, 2019 to May 28, 2019, Bochum, Germany

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: How to statically detect insecure uses of cryptography - at scale and with almost perfect precision Prof. Bodden Abstract. For decades, static code analysis has been notorious for being ineffective, due to high ...
Keynote: Publish-and-Forget: Longitudinal Privacy Techniques and User Behaviour Ass. Pöpper Technological development and the collection of digital data prompt individuals to rethink the boundaries of ...
The Bicho: backdooring CAN bus for remote car hacking Sheila Berta Attacks targeting connected cars have already been presented in several conferences, as well as different ...
"Johnny, you are fired!" – Spoofing OpenPGP and S/MIME Signatures in Emails Damian Poddebniak , Marcus Brinkmann OpenPGP and S/MIME are the two major standards to encrypt and digitally sign emails. Digital ...
Artifical Intelligence in Cyber Security: Threat, Tool or Target? Tobias Burri , Elias Hazboun Recent machine learning algorithms such as Convolutional Neural Networks or LSTMs fueled by modern GPUs ...
Greybox Automatic Exploit Generation for Heap Overflows Sean Heelan In this talk we will introduce a completely grey-box approach to automatic exploit generation for ...
Content-Security-Policies in mass-distributed web apps - doing the undoable David Jardin Content-Security-Policy is a well-established technology that is able to catch Cross-Site-Scripting attacks in modern browsers. ...
Reversing Fraudulent Apps Abdullah Joseph Wherever there is money, there is fraud. Companies invest massive amounts on their ad campaigns ...
Are Microarchitectural Attacks still possible on Flawless Hardware? Michael Schwarz , Erik Kraft In recent years, we have seen that optimizations in processors often enable new microarchitectural side ...
Automate the generation of security documentation Andreas Kuehne , Jens Neuhalfen Formal security documentation is usually a neglected task. However, it’s a basic requirement to have ...
Browser fingerprinting: past, present and possible future Dr. Perre Laperdrix Abstract. Browser fingerprinting has grown a lot since its debut in 2010. By collecting specific ...
Social Engineering through Social Media: profiling, scanning for vulnerabilities and victimizing Christina Lekati Online presence is undeniably important. But despite the benefits social networking can create, a strong ...
1 Trillion Dollar Refund – How To Spoof PDF Signatures Dr.-ing. Vladislav Mladenov The Portable Document Format (PDF) is the de-facto standard for document exchange worldwide. To guarantee ...
Don't Trust The Locals: Exploiting Persistent Client-Side Cross-Site Scripting in the Wild Dr. Ben Stock , Marius Steffens The Web has become highly interactive and an important driver for modern life, enabling information ...