-
Blackshield Awards
-
-
I Boot When U-Boot
- Vincent Ruijter and Bernardo Maia Rodrigues
-
DARWIN (A Parasite Covert Wirelss Network)
- Rushikesh Nandedkar
-
Looting Your Bank Savings Using Digital India
- Indrajeet Bhuyan
-
Welcome Note
- Aseem Jakhar
-
Opening Note
- Rajeev Chandrasekhar
-
Making A Dent, Making A Difference
And Making A Dollar
- Haroon Meer
-
Cybersecurity And Privacy From The Global Lens
- Eva Galperin
-
KRACKing WPA2 Using Key Reinstallation Attacks
- Mathy Vanhoef
-
Information Security Of Government Data:
Practices And Challenges
- Srinivas Kodali
-
The Complexity Of Regulation & Cybersecurity
-
-
Expanding Exploitation Beyond X86 And ARM, Into
The Realm Of Xtensa: A Comparitive Short Study
- Carel van Rooyen and Philipp Promeuschel
-
Regulating Cybersecurity:
The Trouble With, In, And For Policy
- Dr. Anja Kovacs
-
OONI: Measuring Internet Filters
And Their Unexpected Impact
- Leonid Evdokimov
-
Economics Of Hacks And Data Breaches: Who Pays, Who Secures & Who Wins
-
-
White-Stingray: Bypassing Stingray Detectors
- Altaf Shaik
-
The Tor Report
- Amogh Pradeep
-
Panel: Contributing To Society As Cyber Sec Professional
-
-
Should All CISO Promote Hall Of Fame Within Their Organisations
-
-
Unleashing D* On Android Kernel Drivers
- Aravind Machiry
-
Lateral Thinking - Staying Ahead Of The Curve - Items On The CXO Checklist That Can Help Them Surf The Wave.
-
-
Security Through Obscurity And Fear
- Abhinav Srivastava
-
Hacker Insight
-
-
Keynote
- Dr. Sanjay Bahl
-
Next Generation Cyber SOC
-
-
Bootstomp: On The Security Of
Bootloaders In Mobile Device
- Nilo Redini
-
Smells Like Teen Spirit - Internet Of Teens
- Eric Sesterhenn
-
IoT: How Long Till D Day?
-
-
A Game Between Adversary And AI Scientist
- Satnam Singh
-
Software Supply Chain Cyber Attack
- Samiran Ghatak
-
Forensic Challenges and Road Ahead
-
-
Comprehensive Hacker Techniques In Mobile Networks
- Kirill Puzankov
-
SpotPhish: Zero-Hour Phishing Protection
- Ganesh Varadarajan
-
Managing Cyber Risk In The Connected Environment
-
-
Abusing And Attacking Content Sharing Solutions
- Pratap Chandra Allena
-
Privacy And Survellance Talk
- Saikat Datta
-
Breaking Into Container Orchestrators
- Nadeem Hussain Shaikh
-
Social Engineering Village
- Neelu Tripathy
-
Closing Note
- Antriksh Shah