Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nullam blandit hendrerit faucibus turpis dui.
Call For Papers
Tickets & Merch
Sponsorship
Presentations
Workshop sessions
Speakers
Venue info
Copyright @ Select-themes
Follow us
Dániel Komáromy & Lóránd Szabó
How To Tame Your Unicorn – Exploring and Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones
Balázs Beregnyei
Security Issues of an Apartment Intercom and Door Lock System
Tobias Schrödel
The OSINT Internet Detective
Aseel Kayal & Paul Rascagneres
GhostEmperor: From ProxyLogon to Kernel Mode, Story of a Modern Day Rootkit
Csaba Fitzl
“Mount(ain) of Bugs”
Marcel Seibert
Investigating the Exploitability of Trusted Execution Environments
Piotr Glaska
DNS in Offensive Techniques
Áron Szabó
GALILEO: In GPS We Trust?
Zoltán Balázs
MIPS-X – The Next IoT Frontier
Barak Sternberg
Extension-Land: Exploits and Rootkits in Your Browser Extensions
Márk Módly
CSS Keylogger in 2021 – the Hubris of the Security Community
Gabriel Cirlig
Millions for Nothing and Clicks for Free
Bence Horváth
Vulnerabilities in Unexpected Places – When Securing Your Own Environment is No Longer Enough
Gabriel Wierzbieniec
Cloud Security Monitoring and Evasion Techniques
Jose Garduño
C2Centipede: APT Level C2 Communications for Common Reverse HTTP Shell Tools
Alexander Barabanov
Secure by Design: Microservice Application Architecture Assessment
Marek Zmysłowski & Marcin Greziak
Penetration Testing Management – Problems in Large Corporations
Ákos Csilling
Security Awareness in Development
Éric Filiol
How to Bypass Data Exfiltration Detection with Malicious Cryptography Techniques
Szilárd Pfeiffer
How to Use Cheated Cryptography to Overload Your Server
Kamilló Matek
The Key to an “Entire Kingdom” / Pandora FMS – Chained Exploit (CVE-2021-34074)
Mohit Sharma
Mobile App Security Testing is Also Essential
Simon Scannell
A Common Bypass Pattern to Exploit Modern Web Apps
Chloe Messdaghi
Hackers Deserve Rights
Dávid Schütz
4 Weird Google VRP Bugs in 40 Minutes
Tal Melamed
Automatic Serverless Security Testing: Delivering Secure Apps Continuously
Eugene Neelou
The History of Hacking AI Systems