DeepSec 2013 Nov. 19, 2013 to Nov. 22, 2013, Vienna,Austria

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Welcome To DeepSec 2013 Michael Kafka , René Pfeiffer N/A
Geopolitics And The Internet: The Meaning Of "Hegemony" Marcus Ranum N/A
Psychology of Security: a Research Programme Stefan Schumacher N/A IncludeThinkstScapes
Cultural Learning Of China To Make Benefit Glorious Profession Of Infosec Wim Remes N/A
Relax Everybody: HTML5 Is Securer Than You Think Sebastian Lekies N/A
From Misconceptions To Failure – Security And Privacy In The US Cloud Computing FedRAMP Program Mikhail a. Utin N/A
spin: Static Instrumentation For Binary Reverse-Engineering David Guillen Fandos N/A
Risk Assessment For External Vendors Luciano Ferrari N/A
Finux's Historical Tour Of IDS Evasion, Insertions, and Other Oddities Arron Finux Finnon N/A
My Name Is Hunter, Ponmocup Hunter Tom Ueltschi N/A
Easy Ways To Bypass AntiVirus Systems Attila Marosi N/A
Supply Chain: The Exposed Flank Dave Lewis N/A
Hacking Medical Devices Florian Grunow N/A
Prism Break – The Value Of Online Identities. Frank Ackermann N/A
Auditing Virtual Appliances - An Untapped Source Of 0-days Stefan Viehböck N/A
Hack The Gibson: Exploiting Supercomputers John Fitzpatrick N/A
Cracking And Analyzing Apple iCloud Protocols: iCloud Backups, Find My iPhone, Document Storage. Vladimir Katalov N/A Computer Forensics Attack IncludeThinkstScapes iCloud
The Economics Of False Positives Gavin 'jac0byterebel' Ewan N/A
Uncovering your trails. Privacy issues of bluetooth devices. Verónica Valeros , Garcia Sebastian N/A
Hackanalytics: what's hot, what's not Alexey Kachalin N/A
Bypassing Security Controls With Mobile Devices Georgia Weidman N/A
Future Banking And Financial Attacks Konstantinos Karagiannis N/A
Trusted Friend Attack: Guardian Angels Strike Ashar Javed N/A
Static Data Leak Prevention In SAP - The Next Generation Of DLP Andreas Wiegenstein N/A
Malware Datamining And Attribution Michael Boman N/A
Mutually Assured Pwnage Karin Kosina N/A
The Boomerang Effect – Using Session Puzzling To Attack Apps From The Backend Shay Chen N/A
Europe In The Carna Botnet: Telnet's Threat To The Largest Economy Parth Shukla N/A
Top 10 Security Mistakes In Software Peter Af Geijerstam N/A
Using Memory, Filesystems And Runtime To App Pen iOS And Android Andre Gironda N/A
Mobile Fail: Cracking Open "Secure" Android Containers Chris john Riley N/A
Pivoting In Amazon Clouds Andrès Pablo Riancho N/A
Building The First Android IDS On Network Level Jaime Sanchez N/A
Automation In Android & iOS Application Security Review Hemil Shah N/A