Archiv - Hacktivity 2016

Name Talk .pdf Video (hun) Video (eng)
Dániel Komáromy Offense wins games, Defense wins nothing
Kelly Shortridge "The Art of Explanation: Behavioral Models of InfoSec"
Tamás Koczka , Gábor Pék !SpamAndHex hacks around the world
Gábor Molnár War Stories from Google’s Vulnerability Reward Program
Mateusz Olejarka Approaching the unknown - Windows Phone application security assessment guide
René Freingruber Bypassing application whitelisting in critical infrastructures
Tamás K. Lengyel , Sergej Proskurin Stealthy, Hypervisor-based Malware Analysis
Jos Weyers Lock Impressioning
Aleksandar Nikolic Guided Fuzzing And Binary Blobs
Tamás Szakály Help, I've got ANTs!!!
Renáta Hodován Fuzzinator, a browser fuzzing framework
Zoltán Balázs The real risks of the IoT security-nightmare: Hacking IP cameras through the cloud
Julian Kirsch , George Webster A Study of the Rich Header and Respective Malware Triage
Travis Goodspeed A Keynote in Praise of Junk Hacking
Daniel Gruss Microarchitectural Incontinence - You would leak too if you were so fast!
László Miklós Biró Let's hijack an airplane!
Daniel Bohannon Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To) D""e`Tec`T 'Th'+'em'
Stefan Marsiske Post-quantum is the new cyber!!5!
Vladimir Katalov iOS Acquisition Methods Compared: extracting data via physical, logical, or cloud acquisition
Zoz Data Demolition: Gone in 60 Seconds
Miklós Desbordes-Korcsev , Csaba Fitzl Exploit generation and JavaScript analysis automation with WinDBG
Ivan Yushkevich Wordlists: from statistics to genetic
Dmitry Yudin , Dmitry Chastuhin Getting access to the SAP server via SAP Management Console
Matthias Deeg , Gerhard Klostermeier Of Mice and Keyboards: On the Security of Modern Wireless Desktop Sets

Gallery

Sponsors:

Diamond
Gold
Gold
Gold
Silver
Silver
Silver
Silver
Silver
Silver
Silver
Bronze
Bronze
Bronze
Bronze
JOB
JOB
JOB
Technical
Technical