• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2022
  • 2019
  • 2018
  • 2017
Edition logo

Black Alps 2019

2019-11-07 - 2019-11-08
  • Thumbnail for the video - click to play

    ►

    Opening Words
    - Sylvain Pasini
  • Thumbnail for the video - click to play

    ►

    Google Bug Hunters
    - Eduardo Vela Nava
  • Thumbnail for the video - click to play

    ►

    New Tales Of Wireless Input Devices
    - Matthias Deeg and Gerhard Klostermeier
  • Thumbnail for the video - click to play

    ►

    Ethereum: Taking Control Of Smart Contracts
    - Olivier Kopp
  • Thumbnail for the video - click to play

    ►

    OS X RAM Forensic Analysis-Extracting Encryption Keys And Other Secrets
    - Léo Cortès
  • Thumbnail for the video - click to play

    ►

    Computing On Encrypted Data: A Survey
    - Pascal Junod
  • Thumbnail for the video - click to play

    ►

    Building Your Own WAF As A Service And Forgetting About False Positives
    - Juan Berner
  • Thumbnail for the video - click to play

    ►

    Blockchain Vulnerabilities And Exploitation In Practice
    - Nils Amiet
  • Thumbnail for the video - click to play

    ►

    Hash Collision Exploitation
    - Ange Albertini
  • Thumbnail for the video - click to play

    ►

    No More Whack-a-Mole: How To Find And Prevent Entire Classes Of Security Vulnerabilities
    - Sam Lanning
  • Thumbnail for the video - click to play

    ►

    Maintaining Cryptographic Library For 11 Languages: Fun Stories And Epic Bugs
    - Anastasiia Voitova
  • Video will not be published
    Opening Words
    - Yohann Perron
  • Video will not be published
    Cybersecurity For Digital Trains: A UK Perspective
    - George Copeland
  • Video will not be published
    Information Security For IT And For OT: Similarities As A Success Factor
    - Joseph Mager
  • Video will not be published
    Round Table Discussion
    - Yohann Perron,George Copeland,Joseph Mager and others
  • Video will not be published
    Cyber Defense Strategy: No Risk No Fun?
    - Florian Schuetz
  • Thumbnail for the video - click to play

    ►

    Swisscom Bug Bounty: Retour D'Un Chercheur
    - Daniel Le Gall
  • Video will not be published
    On Verifiable Delay Functions: How To Slow Burning The Planet Down (Verifiably)
    - Antonio Sanso
  • Thumbnail for the video - click to play

    ►

    The Inner Guts Of A Connected Glucose Sensor For Diabetes
    - Axelle Apvrille and Travis Goodspeed
  • Video will not be published
    Nouveaux Métiers Et Formations Dans La Cybersécurité
    - Lennig Pedron
  • Thumbnail for the video - click to play

    ►

    Battle In The Clouds: Attacker Vs. Defender On AWS
    - Dani Goland and Mohsan Farid
  • Thumbnail for the video - click to play

    ►

    PatrOwl-Red Flavour Of SOC Automation
    - Nicolas Mattiocco
  • Thumbnail for the video - click to play

    ►

    Fuzzing Java Code With The Help Of JQF
    - Tobias Ospelt