Vom 14. bis 17. November 2017 findet die DEEPSEC wieder im Imperial Riding School Hotel in Wien statt. Das Event gliedert sich an den ersten beiden Tagen (14. und 15. November) in einen Trainingsteil und von 16. bis 17. November in die hochwertige DEEPSEC Konferenz. Link zur Eventseite.
Als Anreiz für Ihren Besuch bietet SEC4YOU einen Rabattcode über 15% gültig für alle neuen Buchungen an. Nutzen Sie das Kontaktformular unten, um Ihren Rabattcode anzufordern:
Auszug aus der Agenda
- Social Science First! — Dr. Jessica Barker (Co-Founder, Redacted Firm)
- Don’t Let The Cuteness Fool You — Exploiting IoT’s MQTT Protocol — dalmoz (Moshe Zioni) (VERINT)
- Next-Gen Mirai — Balthasar Martin & Fabian Bräunlein (SRlabs)
- Paying the Price for Disruption: How a FinTech Allowed Account Takeover — Vincent Haupert, Tilo Müller, and Dominik Maier (Technical University of Berlin, Friedrich-Alexander University Erlangen-Nürnberg)
- Lessons Learned: How To (Not) Design Your Own Protocol — Nicolai Davidsson (zyantific)
- XFLTReaT: A New Dimension In Tunnelling — Balazs Bucsay (NCC Group)
- A Survey On Automated Dynamic Malware Analysis Evasion and Counter-Evasion: PC, Mobile, and Web — Alexei Bulazel & Bulent Yener (River Loop Security, LLC, Rensselaer Polytechnic Institute)
- Lock, Stock And Two Smoking Apples — XNU Kernel Security — Alex Plaskett & James Loureiro (MWR InfoSecurity)
- Behavior Based Secure And Resilient System Development — Dr. Muhammad Taimoor Khan (Alpen-Adria University, Klagenfurt, Austria)
- Wiedergänger: Exploiting Unbounded Array Access Vulnerabilities on Linux — Julian Kirsch, Bruno Bierbaumer, Thomas Kittel, Claudia Eckert (Technical University of Munich)
- How My SVM Nailed Your Malware — Nikhil P. Kulkarni (Independent Security Researcher)
- Beyond The Spear — What Can Organizations Do To Deal With Spear Phishing — Johnny Deutsch (EY USA)
- Who Hid My Desktop – Deep Dive Into hVNC — Or Safran & Pavel Asinovsky (IBM Security Trusteer)
- Insecurity In Information Technology — Tanya Janca (Canadian Government)
- How To Hide Your Browser 0‑days: Free Offense And Defense Tips Included — Zoltan Balazs (MRG Effitas)
- Repairing The internet With Responsible Disclosures — Victor Gevers (0xDUDE) (GDI.foundatoin)
- Malware Analysis: A Machine Learning Approach — Chiheb Chebbi (TEK-UP University)
- PeopleSoft: Hack The Planet’s Universities — Dmitry Yudin (https://erpscan.com)
- Skip Tracing For Fun And Profit — Rhett Greenhagen (McAfee)
- Effective Security Risk Mitigation Strategy For Countering Terrrorism — A Case Study On Pakistan — Captain Kaleem Ahmad ® (Pak Arab Refinery Limited)
- Uncovering And Visualizing Botnet Infrastructure And Behavior — Josh Pyorre & Andrea Scarfo (OpenDNS/Cisco)
- Intel AMT: Using & Abusing The Ghost In The Machine — Parth Shukla (Google)
- Normal Permissions In Android: An Audiovisual Deception — Constantinos Patsakis (University of Piraeus)
- Hacking The Brain For Fun And Profit — Stefan Hager (DATEV eG)
- Out-of-Order Execution as a Cross-VM Side Channel and Other Applications — Sophia d’Antoine, Jeremy Blackthorne, Bülent Yener (Trail of Bits, Rensselaer Polytechnic Institute)
- Forensic Accounting – The What, Why And How — Ulrike Hugl (University of Innsbruck)
- Making Security Awareness Measurable — Stefan Schumacher (Magdeburger Institut für Sicherheitsforschung)
- On The (In-)Security Of JavaScript Object Signing and Encryption — Dennis Detering, Juraj Somorovsky, Christian Mainka, Vladislav Mladenov, Jörg Schwenk (Horst Görtz Institute for IT Security, Chair for Network and Data Security, Ruhr-University Bochum)
- I Wrote my Own Ransomware; Did Not Make 1 Iota Of A Bitcoin — Thomas Fischer (Digital Guardian)
- Cloud Of Suspicion: Scaling Up Phishing Campaigns Using Google Apps Scripts — Maor Bin (Proofpoint)
- Enhancing Control Flow Graph Based Binary Function Identification — Clemens Jonischkeit, Julian Kirsch (Technical University of Munich)
- BITSInject — Control Your BITS, Get SYSTEM — Dor Azouri (Security researcher @SafeBreach)
- How Secure Are Your VoLTE And VoWiFi Calls? — Sreepriya Chalakkal (ERNW GmbH)
- Essential Infrastructure Interdependencies: Would We Be Prepared For Significant Interruptions? — Herbert Saurugg (Cyber Security Austria)
- BitCracker: BitLocker Meets GPUs — Elena Agostini (National Research Council of Italy)
- Bypassing Web Application Firewalls — Khalil Bijjou (EUROSEC GmbH)
- OpenDXL In Active Response Scenarios — Tarmo Randel (CCDCOE)
- How I Rob Banks — Freakyclown (Redacted Firm)
- Securing The Darknet — Jens Kubieziel (TorServers.net)
A story of a vulnerability: How to execute code on a forensic workstation — Wolfgang Ettlinger (SEC Consult) - Building Security Teams — Astera Schneeweisz (SoundCloud)