-
Opening Words
- Sylvain Pasini
-
Google Bug Hunters
- Eduardo Vela Nava
-
New Tales Of Wireless Input Devices
- Matthias Deeg and Gerhard Klostermeier
-
Ethereum: Taking Control Of Smart Contracts
- Olivier Kopp
-
OS X RAM Forensic Analysis-Extracting
Encryption Keys And Other Secrets
- Léo Cortès
-
Computing On Encrypted Data:
A Survey
- Pascal Junod
-
Building Your Own WAF As A Service
And Forgetting About False Positives
- Juan Berner
-
Blockchain Vulnerabilities
And Exploitation In Practice
- Nils Amiet
-
Hash Collision Exploitation
- Ange Albertini
-
No More Whack-a-Mole: How To Find And Prevent
Entire Classes Of Security Vulnerabilities
- Sam Lanning
-
Maintaining Cryptographic Library For
11 Languages: Fun Stories And Epic Bugs
- Anastasiia Voitova
-
Opening Words
- Yohann Perron
-
Cybersecurity For Digital Trains:
A UK Perspective
- George Copeland
-
Information Security For IT And For OT:
Similarities As A Success Factor
- Joseph Mager
-
Round Table Discussion
- Yohann Perron,George Copeland,Joseph Mager and others
-
Cyber Defense Strategy:
No Risk No Fun?
- Florian Schuetz
-
Swisscom Bug Bounty:
Retour D'Un Chercheur
- Daniel Le Gall
-
On Verifiable Delay Functions:
How To Slow Burning The Planet Down (Verifiably)
- Antonio Sanso
-
The Inner Guts Of A Connected
Glucose Sensor For Diabetes
- Axelle Apvrille and Travis Goodspeed
-
Nouveaux Métiers Et
Formations Dans La Cybersécurité
- Lennig Pedron
-
Battle In The Clouds:
Attacker Vs. Defender On AWS
- Dani Goland and Mohsan Farid
-
PatrOwl-Red Flavour
Of SOC Automation
- Nicolas Mattiocco
-
Fuzzing Java Code
With The Help Of JQF
- Tobias Ospelt