Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nullam blandit hendrerit faucibus turpis dui.
Call For Papers
Tickets & Merch
Sponsorship
Presentations
Workshop sessions
Speakers
Venue info
Copyright @ Select-themes
Follow us
Piotr Pobereźny
Perception vs Reality
János Pallagi
Bring your own demise. The corporate threat of mobile endpoints
Anto Joseph
Distributed Fuzzing with k8s
Eddy Willems
My wife is watching me: The spy inside all of us
Dorka Palotay & Albert Zsigovits
Reversing Golang Binaries with Ghidra
Zoltán Balázs
Machine Learning Evasion Competition
Martin Hron
Broken IoT Supply Chain
Filipi Pires
Dissectiong and Comparing Different Binaries to Malware Analysis
Matthias Deeg
Revisiting a Wireless Alarm System
Scott Asai
How Soft Skills Get Hard Results
Gabriel Cirlig
China’s cheap Xiaomis are low on privacy
Etizaz Mohsin
The Great Hotel Hack: Adventures in attacking hospitality industry.
Csaba Fitzl
XPC exploitation
Davide Cioccia & Spyros Manglis
Infra security automation in CI/CD: impossible is nothing
Besim Altinok
Blue Team Over The Air
Moritz Abrell
Penetration testing VoIP UC nowadays
Mateusz Olejarka
Making developers security aware. Lessons learnt.
Pablo González & Fran Ramírez
ATTPwn: Adversary Emulation. ATT&CK Automation
Dr. Mo Ashouri
Stuxnet Attack
Valerio Di Giampetro
Hacking the Hacktivity 2019 badge
Rob Richardson
Service Mess to Service Mesh
Six
State of the Art Phishing
Tal Eliyahu & Begum Calguner
Anatomy of Automated Account Takeovers
Alexander Polyakov
Hacking Facial Recognition Systems
Stéphane Chmielewski
DevSecOps in the Financial Services Industry
Róbert Moody & Bence Horváth
The 5G Battle
Ignat Korchagin
Paste Wars: fighting for copypaste freedom
Speeding Up Linux Disk Encryption
Milecia McGregor
Working with proof key for code exch. to comm. with the cloud