-
Opening Ceremony
- Area41 Organizers
-
It's All About Risk
- John Morgan Salomon
-
Pirates, Privateers, And Mercantile Companies In Cybersecurity
- Florian Egloff
-
The Intelligent Process Lifecycle Of
Cyber Defenders - The Extended Version
- Desiree Sacher-Boldewin
-
Improving Web Application Scanning
- Tobias Ospelt
-
Hacking From The Browser
- Tamas Jos
-
Building A Red Team – The Best Defense Is A Good Offense
- Daniel Fabian
-
Subverting ProBase Security For Fun And Profit:
A Sophisticated ATM Blackboxing Case
- Frank Boldewin
-
Security Content Creator Panel
- Carl Svensson,Robbe van Roey and Thomas Roth
-
Develop Your Own RAT:
EDR + AV Defense
- Dobin Rutishauser
-
Command & Control Freak: Cloud Edition
- Dagmawi Mulugeta
-
Into The Dark:
Switching Off Renewable Power From Everywhere
- Stephan Gerling
-
Counter-Strike: Global Offsets
A Journey Into Exploiting The Source Engine
- Niklas Brymko,Simon Scannell and Carl Smith
-
No Passwords More Problems
- Philipp Mao
-
A Proprietary Security Protocol For Hearing Aids:
Why We Need One, And How To Design,
Implement And Formally Verify One
- Michael Von Tessin and Alexander Maksyagin
-
How A Smart Conferencing Device
Turned Into A Security Nightmare
- Max Moser
-
Closing Ceremony
- Area41 Organizers