-
GNU Anastasis: Privacy-Preserving Key Backup And Recovery
- Christian Grothoff
-
Careful Who You Trust: Compromising P2P Cameras At Scale
- Erik Barzdukas and Jake Valletta & Dillon Franke
-
Opening Note
- Antriksh Shah
-
High-assurance Code Reviews:
How Consulting Works When The Risks Are High
- Dan Guido
-
Fuzzware: Automating And Scaling Fuzzing For Firmware
- Tobias Scharnowski and Marius Muench
-
A Broken Commercial Metaverse-based
Virtual Office Platform
- Team MetaVersPloit
-
Digital Identity In The Age Of Fintechs
-
-
GPG Memory Forensics
- Nils Amiet and Sylvain Pelissier
-
Badkeys:
Finding Weak Cryptographic Keys At Scale
- Hanno Böck
-
Bug Bounty? Great! Now What?
-
-
Attack Surfaces For 5G Networks?
- Altaf Shaik
-
Finding And Exploiting Critical Bugs In
TLS Libraries Used By “Smart” UPS Devices
- Yuval Sarel and Gal Levy
-
Hunting Evasive Vulnerabilities:
Finding Flaws That Others Miss
- James Kettle
-
Making Of: The Sanitizer API
- Frederik Braun
-
Jailbreaking The AppleTV3:
Tales From A Full Stack Hack
- Tihm Star
-
Diversity In Bug Hunting
-
-
How To Bypass AM-PPL (Antimalware Protected Process
Light) And Disable EDRs - A Red Teamer's Story
- Stephen Kho and Juan Sacco
-
Deep Links Can Be Friends Of Spyware:
Analysis The Dangerous Role Of Deep Links
- Rahul Kankrale and Yogesh Anil Tantak
-
Web3: The Great Debate
-
-
Bheem OS - A Next-Generation Reasonably
Secure OS Using Rust MicroVMs
- Subash SN and Mohd Akram Ansari
-
Closing Note & Prize
- Nullcon Organisers