-
Keynote
- Riccardo Sibilia
-
It’s Raining Shells - How To Find
New Attack Primitives In Azure
- Andy Robbins
-
How We've Built One Of The Most
Secure Media Companies In The World
- Andreas Schneider
-
Cyberterrorism And The Energy Sector: A Framework To Improve
Collaboration Between Lawmakers And Cybersecurity Experts
- Chris Esquire
-
Delegating Kerberos To Bypass
Kerberos Delegation Limitation
- Charlie Bromberg
-
Introduction To
Open Source Investigations
- Aiganysh Aidarbekova
-
Securing Critical Infrastructures With Fortinet
- Dino-Boris Dougoud
-
Breaking SecureBoot With SMM
- Itai Liba & Assaf Carlsbad
-
An Insider Threat:
What Is Social Engineering?
- Crux Conception
-
Exploiting WebKit To Break
Authentication And Authorization
- Sachin Thakuri & Prakash Sharma
-
Raising Employee Awareness:
Which Training Strategy To Go For?
- Eric Bärenzung
-
Automatically Extracting
Static Anti-virus Signatures
- Vladimir Meier
-
Practical Exploitation Of Zigbee-class Networks With
USB-based RF Transceivers & Open Source Software
- Nitin Lakshmanan & Sunil Kumar
-
REW-sploit:
Dissect Payloads With Ease
- Cesare Pizzi
-
Forging Golden Hammer
Against Android App Protections
- Georges-Bastien Michel
-
Adventurous Tales Of
Online Voting In Switzerland
- Christian Folini
-
Two Bugs To Rule Them All:
Taking Over The PHP Supply Chain
- Thomas Chauchefoin
-
Managing Large-Scale Response
- Mathias Fuchs
-
Ransomware Encryption Internals:
A Behavioral Characterization
- Antonio Cocomazzi
-
A Common Bypass Pattern
To Exploit Modern Web Apps
- Simon Scannell
-
The Rat-Race Detection Game
- Myriam Leggieri
-
Noise And Signals – Digging
Through Threat- And APT-stories
- Marco Preuss
-
Hook, Line And Sinker:
Pillaging API Webhooks
- Abhay Bhargav
-
Stop This Car || GTFO
- Karim Sudki
-
Telsys & AWS: A Trusted Cooperation To Support
Swiss Customers On Their Cloud Journey.
- Colin Szajkowski,Geoffray Schmitt and Stephane Broquere
-
Symbolic Execution Demystified
- Jannis Kirschner
-
Future Proofing Your Security Operations Center
- Amitabh Singh
-
Void Balaur:
A Cyber Mercenary From The Underground
- Feike Hacquebord
-
Attacking Bluetooth LE Design And
Implementation In Mobile + Wearables Ecosystems
- Rahul Umapathi and Nitin Lakshmanan
-
Hunting For Bugs In "Ethereum 2.0"
- Denis Kolegov and JP Aumasson
-
Loose Lips Might Sink Clouds
- Jason Hill and Dvir Sason
-
Blacksmith: A Blackbox Fuzzer For Bypassing
Rowhammer Mitigations On DDR4 DRAM Devices
- Patrick Jattke and Stijn Gunter
-
Practical Bruteforce Of Military Grade AES-1024
- Sylvain Pelissier and Boi Sletterink
-
The Nym Network Deep-dive
- Simon Wicky