-
Opening Note
- Antriksh Shah
-
Server Side Prototype Pollution:
Blackbox Detection Without The DoS
- Gareth Heyes
-
SCCI: The Road To Side-Channel Regression Testing
In Continuous Integration Development
- Witold Waligóra
-
Dirty Stream Attack, Turning Android
Share Targets To Attack Vectors
- Dimitrios Valsamaras
-
Critical Infrastructure – It’s Not All About Power
- Panel
-
Not So Famous Attack Vectors In The
World Of Smart Contract Security!
- Tejaswa Rastogi
-
(In)Secure Remote Operations:
What Sucks, Rocks, And A Super-CLI
- Yossi Sassi
-
Securing the road to Autonomy
- Panel
-
Chop Suey: An Exceptional Dish
With A Side Of Buffer Overflows
- Fabian Freyer & Marius Muench
-
Why I Write My Own Security Tooling
And Why You Should Too!
- James Forshaw
-
Colorful Vulnerabilities - How Changing The Colors
Colorful Vulnerabilities @
Of Your Keyboard Might Lead To Privilege Escalation
- Tal Lossos & Eran Shimony
-
The Achilles Heel
Of The macOS Gatekeeper
- Jonathan Bar Or
-
How To Make Security Easier For Your Developers?
- Panel
-
The Silent Spy Among Us:
Modern Attacks Against Smart Intercoms
- Vera Mens
-
The Invasion Of Bad Drivers
- Omer Tsarfati
-
Elements Of A Successful Security Strategy: A Comprehensive Approach
- Panel
-
Security Journey In French
Network Access Controller
- Baptiste David
-
Closing Note & Prize
- Antriksh Shah