-
Federal Intelligence Service: How We Help To Protect
Protect Switzerland Against Serious Cyber Threats
- Mauro Vignati
-
Growing Hypervisor 0day With Hyperseed
- Shawn Denbow
-
The way from App to Brain: attack surfaces of smart medical infrastructure
- Denis Makrushin
-
The Evolution Of Cloud Threats
- Paolo Passeri
-
Spyware, Ransomware and Worms. How to prevent the next SAP tragedy
- Jordan Santarcieri
-
Building A Flexible Hypervisor-Level Debugger
- Mathieu Tarral
-
SD-WAN - Yet Another Way to Unsafe Internet
- Denis Kolegov and Oleg Broslavsky
-
Security Analysis On The Attack
Surface Of Blockchain Client
- Chen Nan and Kame Wang
-
On the Security Of Dockless Bike Sharing Services
- Antoine Neuenschwander
-
Analyzing A Portable Wireless Storage
Device From Zero To Remote Code Execution
- Qinghao Tang and Shuo Yuan
-
What Every (IT | Security) Professional Should Know About The Dark Web
- Mischa Peters
-
Let's Hack The IoT Hub With Pwnhub Dudes:
IoT Hub Exploitation And Countermeasure
- Jisub Kim and Kanghyun Choi
-
Medieval Castles And Modern Servers
- Christian Folini
-
These Are The Droids You Are Looking For:
Practical Security Research On Android
- Elena Kovakina
-
Sneaking Past Device Guard
- Philip Tsukerman
-
Intelligence-driven Red Teaming
- Peter Hladký
-
Vulnerabilities Of Mobile OAuth 2.0
- Nikita Stupin
-
Turning Your BMC Into A Revolving Door:
The HPE ILO Case
- A. Gazet,F. Perigaud and J. Czarny
-
NSX-T Architecture And Benefits
- Erik Bussink
-
Betrayed By The Android User Interface:
Why A Trusted UI Matters
- Yanick Fratantonio
-
Secure Boot Under Attack: Simulation
To Enhance Fault Attacks and Defenses
- Martijn Bogaard
-
Digitalisation Demands Defensive Action
- Daniel Caduff
-
Cryptocurrency Mobile Malware
- Axelle Apvrille
-
Threat Hunting Research Methodology:
A Data Driven Approach
- Roberto Rodriguez and Jose Luis Rodriguez
-
Addressing Privacy: GDPR, Cloud, And You
- Chris Esquire
-
How To Investigate IOS Devices
- Paul Rascagneres
-
Dear Blue Team: Forensics Advice To
Supercharge Your DFIR Capabilities
- Joe Gray
-
From The Cloud To The Internal Network:
Offense Vs Defense
- Snir Ben-Shimol
-
Wake Up Neo: Detecting Virtualization
Through Speculative Execution
- Innokentii Sennovskii
-
Exploits In Wetware
- Robert Sell