BlackAlps19 2019 Nov. 7, 2019 to Nov. 8, 2019, Yverdon-les-Bains, Switzerland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
GOOGLE BUG HUNTERS Eduardo Vela Nava Bug Hunting, just as any other type of hunting, requires preparation, skills, practice, and patience. ...
NEW TALES OF WIRELESS INPUT DEVICES Matthias Klostermeier In our talk, we will present new security tales of wireless mice, keyboards, and presenters ...
ETHEREUM : TAKING CONTROL OF SMART CONTRACTS Olivier Kopp Ethereum is a widely spread cryptocurrency, dealing with hundreds of millions USD worth ethers per ...
OS X RAM FORENSIC ANALYSIS - EXTRACTING ENCRYPTION KEYS AND OTHER SECRETS Léo Cortès The memory is full of incredible artefacts. Some of them are secrets being used for ...
COMPUTING ON ENCRYPTED DATA: A SURVEY Pascal Junod Techniques related to computing on encrypted data are more and more deployed by large companies, ...
BUILDING YOUR OWN WAF AS A SERVICE AND FORGETTING ABOUT FALSE POSITIVES Juan Berner When a Web Application Firewall (WAF) is presented as a defensive solution to web application ...
NO MORE WHACK-A-MOLE: HOW TO FIND AND PREVENT ENTIRE CLASSES OF SECURITY VULNERABILITIES Sam Lanning We frequently see the same types of security vulnerabilities appearing repeatedly over the course of ...
MAINTAINING CRYPTOGRAPHIC LIBRARY FOR 11 LANGUAGES: FUN STORIES AND EPIC BUGS Anastasiia Voitova Maintaining cross-platform cryptographic library is a journey full of unexpected bugs, language-specific hacks, difficult decisions ...
CYBERSECURITY FOR DIGITAL TRAINS; A UK PERSPECTIVE George Copeland In the UK, railway rolling stock is within the scope of NIS. This is a ...
INFORMATION SECURITY FOR IT AND FOR OT: SIMILARITIES AS A SUCCESS FACTOR Joseph Mager The information security of cyber physical systems, often referred to as operational technology (OT), is ...
CYBER-SECURITY: NO RISKS NO FUN? Florian Schütz In Switzerland we focus our discussion mainly on cyber risks, omitting the fact that there ...
SWISSCOM BUG BOUNTY - RETOUR D'UN CHERCHEUR Daniel Le Gall Retour sur le Bug Bounty de Swisscom d'un chercheur qui a trouvé une centaine de ...
ON VERIFIABLE DELAY FUNCTIONS - HOW TO SLOW BURNING THE PLANET DOWN (VERIFIABLY) Antonio Sanso The year is 2089, Venice is under the water and Bitcoin finally replaced Dollar as ...
THE INNER GUTS OF A CONNECTED GLUCOSE SENSOR FOR DIABETES Axelle Apvrille Connected glucose sensors are a very handy way for people with diabetes to get their ...
NOUVEAUX MÉTIERS ET FORMATIONS DANS LA CYBERSÉCURITÉ Lennig Pedron Le domaine de la cybersécurité a évolué très rapidement ses 3 dernières années. Les formations ...
BATTLE IN THE CLOUDS: ATTACKER VS DEFENDER ON AWS Dani Farid The interaction between attackers and defenders is like a ping pong game, and that is ...
PATROWL - RED FLAVOUR OF SOC AUTOMATION Nicolas Mattiocco PatrOwl is an Open Source, adaptive and scalable Security Operations Orchestration Platform. The main objective ...
FUZZING JAVA CODE WITH THE HELP OF JQF Tobias Ospelt Fuzzing is the process of automatically feeding potentially corrupt input to a program with the ...