-
How Will Cryptography Survive
The Rise Of Quantum Computing?
- Rakhim Davletkaliyev
-
FRIDA, The "Hooker"
- Barnabás Sztán-Kovács
-
Social Networks Are Social Weapons
- Tobias Schrödel
-
Scale Your Auditing Events
- Philipp Krenn
-
How To Be A Pentester?
- Zsombor Kovács
-
Abusing Google Play Billing
For Fun And Unlimited Credits!
- Guillaume Lopes
-
Sustainability Of The X86 Insecurity Model
- Dávid Török
-
The Katz Out Of The Bag
- Sándor Fehér
-
To Write Or Not Write, That Is The Question - Abusing
Of Leaked Data And Vulnerable User Assets On Android
- Julien Thomas
-
OWASP Top 10 Like I’m Five:
From A Bug Bounty Hunter's Perspective
- Dávid Schütz
-
Precaution - Your Source... For Vulnerabilities
- Martin Vrachev
-
Return-Oriented-Exploitation On ARM
- Tamás Tokics
-
Measuring The Unmeasurable:
How To Estimate The Vulnerability Of The Users?
- Dr. Ferenc Leitold
-
Closing Notes
- Attila Marosi-Bauer