• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2024
  • 2022
  • 2018
Edition logo

Area41 2018

2018-06-15 - 2018-06-16
  • Thumbnail for the video - click to play

    ►

    Opening Ceremony
    - AREA41 team
  • Thumbnail for the video - click to play

    ►

    Keynote
    - Costin Raiu
  • Thumbnail for the video - click to play

    ►

    Monitoring MacOS For Malware And Intrusions
    - Daniel Roethlisberger
  • Thumbnail for the video - click to play

    ►

    Chrome & WebRTC -eq Problems
    - Amit Dori
  • Thumbnail for the video - click to play

    ►

    From DDoS To Mining: Chinese Cybercriminals Set Their Sights On Monero
    - David Liebenberg
  • Thumbnail for the video - click to play

    ►

    Looking Into The White Box
    - Pascal Junod
  • Thumbnail for the video - click to play

    ►

    The Story Of Greendale
    - Thomas Chopitea
  • Thumbnail for the video - click to play

    ►

    Blame The Badge, Or How A Conf Badge Had Us Exploring Xtensa Exploitation (Compared To ARM)
    - Carel van Rooyen and Philipp Promeuschel
  • Thumbnail for the video - click to play

    ►

    Red Team: Stories From The Trenches
    - Stefan Friedli and Michael Schneider
  • Thumbnail for the video - click to play

    ►

    Replacing Reality - What You See Is What You Get... NOT
    - David Wollmann
  • Thumbnail for the video - click to play

    ►

    Smart != Secure - Breaking Ethereum Smart Contracts
    - Elliot Ward and Jake Humphries
  • Thumbnail for the video - click to play

    ►

    On The Security Of Dockless Bike Sharing Services
    - Antoine Neuenschwander
  • Thumbnail for the video - click to play

    ►

    Recovering From Years Of Security Debt: A How-To On Building An Information Security Program From The Ground Up
    - Amanda Berlin
  • Thumbnail for the video - click to play

    ►

    Modern Pentest Tricks For Faster, Wider, Greater Engagements
    - Thomas Debize
  • Thumbnail for the video - click to play

    ►

    Defense-In-Depth Techniques For Modern Web Applications And Google's Journey With CSP
    - Michele Spagnuolo and Lukas Weichselbaum
  • Thumbnail for the video - click to play

    ►

    Anatomy Of Financial Attacks By The Lazarus Group
    - Seongsu Park
  • Thumbnail for the video - click to play

    ►

    Practical Threat Modelling For Software Defined Network
    - Sergey Gordeychik,Alexander Timorin and Denis Kolegov
  • Thumbnail for the video - click to play

    ►

    Lazy Ways To Own Networks
    - Nicolas Heiniger
  • Thumbnail for the video - click to play

    ►

    Secure Messengers And Man In The Contacts: The Ultimate Spear Phishing Weapon?
    - Jérémy Matos
  • Thumbnail for the video - click to play

    ►

    Swimming IoT Or How To Hack A Vessel
    - Stephan Gerling
  • Thumbnail for the video - click to play

    ►

    Web Cryptominers In The .CH Zone
    - Antoine Neuenschwander
  • Thumbnail for the video - click to play

    ►

    The Future Of Threat Intelligence Platforms Sharing Data With Privacy In Mind
    - Paolo Di Prodi
  • Thumbnail for the video - click to play

    ►

    Fuzzing For Worms
    - Dobin Rutishauser
  • Thumbnail for the video - click to play

    ►

    The Day You Got Hacked
    - Pascal Gloor
  • Thumbnail for the video - click to play

    ►

    Closing Ceremony
    - AREA41 team