Troopers 2014 March 19, 2014 to March 20, 2014, Heidelberg, Germany
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote | George Bakos | N/A | |
Security and SDN – A perfect fit or oil-and-water? | Ivan Pepelnjak | Software-defined networks have quickly become one of the most overhyped networking concepts, with vendors promising ... | |
Security through Obscurity, powered by HTTPS | Sebastian Schrittwieser , Peter Frühwirt | Applications on modern smartphone operating systems are protected against analysis and modification through a wide ... | |
Injecting evil code in your SAP J2EE systems: Security of SAP Software Deployment Server | Alexander mikhailovich Polyakov , Dimitry chastuhin | Why break critical systems themselves when we can attack Deployment Server: the core from which ... | |
Granular Trust; making it work | Toby Kohlenberg | Over the last 5 years the concept of using dynamic or granular trust models to ... | |
How to Own your Heart – Hacking Medical Devices | Florian Grunow | In the last few years we have seen an increase of high tech medical devices, ... | |
Bro: A Flexible Open-Source Platform for Comprehensive Network Security Monitoring | Robin Sommer | Bro is a highly flexible open-source monitoring platform that is today protecting some of the ... | |
OSMOSIS – Open Source Monitoring Security Issues | Christian Sielaff , Daniel Hauenstein | By trying to emulate a real world environment, we have deliberately chosen software solutions, which ... | |
Risks in hosted SAP Environments | Xu Jia , Andreas Wiegenstein | Many SAP customers have outsourced the operation of their SAP systems in order to save ... | |
Get Over It: Privacy is Good for Security | Rob Lee | Over the last year government leaks regarding nation-state digital espionage and surveillance have made the ... | |
What Happens In Windows 7 Stays In Windows 7 | Marion Marschalek , Joseph Moti | Synopsis: Systems evolve over time, patches are applied, holes are fixed, new features are added. ... | |
Easy Ways To Bypass Anti-Virus Systems | Attila Marosi | All IT security professionals know that antivirus systems can be avoided. But few of them ... | |
20 Ways past Secure Boot | Job de Haas | This talk presents an overview of all things that can go wrong when developers attempt ... | |
Psychology of Security | Stefan Schumacher | IT Security is often considered to be a technical problem. However, IT Security is about ... | |
Implementing an USB Host Driver Fuzzer | Daniel Mende | The Universal Serial Bus (USB) can be found everywhere these days, may it be to ... | |
SAP’s Network Protocols Revisited | Martin Gallo | What network protocols does my SAP system use? Are those services secure from a network ... | |
SAP BusinessObjects Attacks: Espionage and Poisoning of Business Intelligence platforms | Will Vandevanter , Juan Perez-etchegoyen | Business executives make their strategic decisions and report on their performance based on the information ... | |
Vulnerability Classification in the SaaS Era | Noam Liran | This talk we will thoroughly analyze two major SaaS vulnerabilities that were found by Adallom ... | |
How to Work towards Pharma Compliance for Cloud Computing– What Do FDA and Similar Regulations Mean for Your (Cloud) IT Delivery Organisation? | Martijn Jansen | Today, for life-sciences or consumer goods manufacturers/food/drug companies’ regulatory compliance is quite a heavy burden ... | |
Compromise-as-a-Service: Our PleAZURE. | Matthias Luft , Felix Wilhelm | This could be a comprehensive introduction about the ubiquity of virtualization, the essential role of ... | |
Making (and Breaking) an 802.15.4 WIDS | Ryan Speers , Sergey Bratus , Javier Vazquez | Real-world security-critical systems including energy metering and physical security monitoring are starting to rely on ... | |
Modern smartphone forensics: Apple iOS: from logical and physical acquisition to iCloud backups, document storage and keychain; encrypted BlackBerry backups (BB 10 and Olympia Service) | Vladimir Katalov | Apple iCloud Backups: there are various methods to perform data acquisition from iOS devices: logical, ... | |
Hiding the breadcrumbs: Anti-forensics on SAP systems | Will Vandevanter , Juan Perez-etchegoyen | SAP systems are running our most critical business processes. SAP security has been increasing over ... | IncludeThinkstScapes |
Medical Device Cyber Security: The First 164 Years | Kevin Fu | Today, it would be difficult to find medical device technology that does not critically depend ... | |
Security Analysis of the Computer Architecture: What a software researcher can teach you about your computer | Rodrigo Rubira Branco | This talk will clarify different aspects of a modern computer architecture, with emphasis in the ... | |
The Three Billion Dollar App | Vladimir Wolstencroft | Mobile social applications are proliferating through our society and are starting to take the lime ... |