DEEPSEC 2020 Nov. 17, 2020 to Nov. 20, 2020, Vienna, Austria

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
DevSecBioLawOps and the current State of Information Security René 'lynx' Pfeiffer Information security is a field of many skills. There is no doubt about this. Modern ...
EPP/EDR - Unhooking Their Protections Daniel Feichter More and more we see in our penetration tests, that companies do not just rely ...
How To Combat Risks Directly From Within Your IDE Christian Schneider If we can build software in a reliable, reproducible and quick way at any time ...
Improve Your Threat Hunt With Adversary Emulation Thomas V Fischer Adversary Emulation is a type of ethical hacking engagement where the Red or Purple Team ...
Abusing Azure Active Directory: Who Would You Like To Be Today? Dr. Nestori Syynimaa Azure AD is used by Microsoft Office 365 and over 2900 third-party apps. Although Azure ...
Old Pareto had a Chart: How to achieve 80% of Threat Modelling Benefits with 20% of the Efforts Irene Michlin The earlier in the lifecycle you pay attention to security, the better are the outcomes. ...
The Great Hotel Hack: Adventures in attacking Hospitality Industry Etizaz Mohsin Ever wondered your presence exposed to an unknown entity even when you are promised for ...
Ransomware: Trends, Analysis and Solutions Josh Pyorre Ransomware is one of the most damaging variations of malware to date, extorting individuals, companies, ...
Exploiting Interfaces of Secure Encrypted Virtual Machines Martin Radev Cloud computing is a convenient model for processing data remotely. However, users must trust their ...
Security Model Of Endpoint Devices Martin Kacer Have you ever asked these questions? You are using the latest mobile and using your ...
DarkCrewBot – The Return Of The Bot Shop Crew Ori Yosefian Check Point Researchers recently discovered an ongoing, evolving campaign from a known hackers’ group, “DarkCrewFriends.” ...
A survey on practical adversarial examples for malware classifiers Daniel Park Machine learning based solutions have been very helpful in solving problems that deal with immense ...
U21: Protecting Mobile Devices from Malware Attacks with a Python IDS Sebastian Garcia , Kamila Babayeva Technology poses a risk of cyber attacks to all of us, but mobile devices are ...
Journey Into Iranian Cyber Espionage Chris Kubecka Welcome to the new Cold War in the Middle East. In 2012, Iran’s first Shamoon ...
No Need to Teach New Tricks to Old Malware: Winning an Evasion Challenge with XOR-based Adversarial Fabrício Ceschin Adversarial machine learning is so popular nowadays that Machine Learning (ML) based security solutions became ...
Faulting Hardware from Software Daniel Gruss Fault attacks induce incorrect behavior into a system, enabling the compromise of the entire system ...
“I Told You So!” – Musings About A Blameless Security Culture Tim Berghoff , Hauke Gierow The concept of a blameless culture is familiar to agile software development teams the world ...
Efficient Post-quantum Digital Signature Maksim Iavich Active work is being done to create and develop quantum computers.Traditional digital signature systems, which ...
The Art Of The Breach Robert Sell The Art of the Breach is designed to be a journey for anyone interested in ...
Street Cred: Fixing Authentication From Passwords To Passwordless Wolfgang Goerlich Don’t say no one likes passwords. It isn’t true. Criminals love them. Passwords are easy ...
Secure Onboarding in the Eclipse Arrowhead Framework Silia Maksuti The Eclipse Arrowhead Framework addresses the move from large monolithic organisations towards multi-stakeholder cooperation, thus ...
What's Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis Shyam Sundar Ramaswami "Catch me if you can!" is the right phrase to describe today's malware genre. Malwares ...
Security of Home Automation Systems – A Status Quo Analysis For Austrian Households Edith Huber , Albert Treytl Home Automation System (HAS) are a growing market, which is very diverse ranging from consumer ...
Oops! Look twice Paula Garrido Targeted cyber attacks sometimes imply to investigate and mimic the people who work in a ...
Scaling A Bug Bounty Program Catalin Curelaru Bug bounties have started to make headlines over the past years and currently we can ...
RedTeamOps Mert Can Coskuner , Caglar Cakici Red team operations involve many skills, the operation requires a lot of monitoring, consolidating and ...
No IT Security Without Free Software Max Mehl IT security is one of the most challenging global issues of recent years. But apart ...
Am I really becoming a cyborg? Human implants as the next big Security, Privacy and Ethics Debate Prof. Ulrike Hugl Many say “We will all, probably, be chipped”, others say “Never”! However, chipping humans can ...
Caught in the Middle with You: Examining the Implications of Adversary Midpoint Collection Joe Slowik Information security typically focuses on endpoint exploitation and manipulation. However, adversaries increasingly migrate attacks to ...
Through the Looking-Glass, And What A Hacker Found There Mario Valori My research is focusing on social engineering attacks conducted against the healthcare sector in stressful ...
Practical Mobile App Attacks By Example Abraham Aranguren A significant amount of confusion exists about what kind of damage is possible when vulnerabilities ...
Pivoting - As an Attack Weapon Filipi Pires Demonstrating an exploit in a container environment (three dockers) across three different networks, I will ...
TaintSpot: Practical Taint Analysis and Exploit Generation for Java Dr. Mohammadreza Ashouri According to the report published by the Common Vulnerabilities and Exposures (CVE) organization, the number ...