-
Opening Words
- Sylvain Pasini
-
We've Not Been Trained For This:
Life After The Newag DRM Disclosure
- Michał Kowalczyk,Jakub Stepniewicz and Q3k
-
Reach The Nirvana:
Hijack, Inject, Sleep
- Yoann Dequeker
-
Broken Isolation: Draining Your Credentials
From Popular MacOS Password Managers
- Wojciech Regula
-
Who Dat? Sender-Constraining
Personal Access Tokens
- Vitor Meireles and Rohit Shambhuni
-
GlobalConfusion: TrustZone Trusted
Application 0-Days By Design
- Marcel Busch and Philipp Mao
-
IDAT Loader:
The Malware’s Camouflaged Weapon
- Niranjan Jayanand
-
GCP CL-WHY: The Hacker's And
The Hero's Guide To The CLI
- Shannon McHale
-
Iconv, Set The Charset To RCE:
Exploiting Glibc To Hack The PHP Engine
- Charles Fol
-
Corporate Event Panel Discussion
- Panel Discussion
-
Opening Words
- Sylvain Pasini
-
Are We On The Edge Of An AI Cybercrime
Armageddon? Separating Hype From Reality
- Candid Wüest
-
Start Them Early And Keep On Keepin’ On.
An Industry Perspective On Automated Protocol Analysis
For Designing And Iterating Cryptographic Protocols
- Marc Ilunga
-
The Pitfalls Of Fully Homomorphic Encryption:
When IND-CPA Security Is Not Enough
- Jean-Philippe Bossuat
-
Unveiling The Offensive Potential Of
Group Policy Objects In Active Directory:
Old - And New GPO ACLs Attack Vectors
- Quentin Roland
-
Now I See You:
Pwning The Synology BC500 Camera
- Emanuele Barbeno
-
Crypto Wallet - What Could Go Wrong?
- Ryan Sauge
-
Rump Session
- Several Speakers