-
Opening
- BlackAlps Organizers
-
Let's Create A Redteam Mission
- Alex Kouzmine
-
Bypass Android Security
Mechanisms Using Custom Android
- SungHyoun Song
-
Dilemmas Everywhere!
Get It Right Or Get Pwned
- Ethan Schorer
-
Reversing Cryptographic Primitives
Using Quantum Computing
- Renaud Lifchitz
-
Application Level DDoS, The Rise Of CDNs
And The End Of The Free Internet
- Christian Folini
-
3 Years Later:
A Crossed Look At Swisscom Bounty
- Florian Badertscher and Nicolas Heiniger
-
Reversing And Vulnerability Research
Of Ethereum Smart Contracts
- Patrick Ventuzelo
-
Nail In The JKS Coffin
- Tobias Ospelt
-
Cryptocurrency Mobile Malware
- Axelle Apvrille
-
Opening Words
- Sylvain Pasini and Yohann Perron
-
Challenges Of Our Hospitals When
Working With Connected Devices
- Pierre-François Regamey
-
State Of The Art In Security Applied To Medical Devices
Through A Successful Implementation Of An Insulin Pump
- Stephan Proennecke
-
Current Status Of Regulations On
Cybersecurity For Medical Devices
- Kim Rochat
-
Round Table
- Pierre-François Regamey,Stephan Proennecke and Kim Rochat
-
Challenges And Opportunities In Cloud Security
- Scott Piper
-
Unlocking Secrets Of The Proxmark3 RDV4.0
- Christian Herrmann And Kevin Barker
-
Group123: Korea In The Crosshairs
- Paul Rascagneres
-
Build Your Own Hardware Implant
- Nicolas Oberli
-
Switzerland Has Bunkers, We Have Vault
- Christophe Tafani-Dereeper
-
How To Provide Security Fixes In A High Constraint
Ecosystem? Practical Examples With The Jenkins Project.
- Wadeck Follonier
-
Building An Open Source Kubernetes Security Stack
- Henri Dubois-Ferriere
-
Cyber Defence Exercise Locked Shields And
Cyber Exercises In The Financial Sector
- Peter Hladký