Login

login

Search

Sponsors

Diamond

Gold

Silver

Bronze

Technical

Programs

1 . day, 2011. September 17.

Security Theater
Security Dome
08:00 - 09:00 - Registration
09:00 - 09:15 - Opening
09:15 - 10:15 - Peter Szor - Keynote - Fighting Computer Malware
The PC computer virus problem is 25 years old...
09:15 - 10:15 - Peter Szor - Keynote - Fighting Computer Malware
The PC computer virus problem is 25 years old...
10:15 - 10:25 - break
10:25 - 11:10 - Csaba Barta - Forensic analysis of NTDS.DIT
The presentation introduces a software...
10:25 - 11:10 - Zsolt Illési - IT as evidence from forensics perspective
Different areas of law have different...
11:10 - 11:15 - break
11:15 - 12:00 - Joe McCray - There's An App For That: Pentesting Mobile Applications
- Using Android/iPod/iPhone/iPad as a Pentest...
11:15 - 12:00 - Dr. Tibor Peszleg - What to do when the problem is on board?
Points of consideration will be given for...
12:00 - 12:05 - break
12:05 - 12:50 - Alexander Kornbrust - Oracle Forensic
The talk is about Oracle forensic and how...
12:05 - 12:50 - Zoltán Alexin - Big Hungarian Health Databases
Medical data belong to the special categories...
12:50 - 13:30 - Launch break
13:30 - 14:15 - Ákos Subecz Csaba Zánthó - Lockpicking – the finest art of opening locks
In my presentation I will introduce the...
13:30 - 14:15 - Ferenc Leitold, Ph.D Botond Horváth - Internet in the sandbox
Nowadays most malware incidents are related to...
14:15 - 14:20 - Break
14:20 - 15:05 - Ertunga Arsal - Rootkits and Trojans on Your SAP Landscape
In this lecture I present several attack paths...
14:20 - 15:05 - Győző Kovács - My Assorted Wanderings in IT
For instance when John von Neumann designed the...
15:05 - 15:10 - Break
15:10 - 15:55 - László Tóth - Almost invisible cloak in Oracle databases or the “undocumented” helps us again
In this presentation László goes further and...
15:10 - 15:55 - Dániel Muszka - The Kalmár Era in Szeged
László Kalmár was not only a scientist and...
15:55 - 16:15 - Break
16:15 - 17:00 - András Veres-Szentkirályi - Hacking hardware for fun and profit
In my lecture I show Ardunio's ecosystem and I...
 
17:00 - 17:05 - break
17:05 - 17:50 - Felix Schuster - Design and implementation of an additional layer of encryption for Skype
The presentation will describe the major...
17:05 - 17:50 - Arnold Őszi Csaba Otti - Fingerprint identification systems, security or security leak
We need to make a copy of a person’s finger...
17:50 - 17:55 - Break
17:55 - 18:40 - Péter Gara-Tarnóczi - Customizing Public Exploits
In my presentation, I show you how to improve...

2 . day, 2011. September 18.

Security Theater
Security Dome
09:00 - 09:45 - Tamás Paulik - Who's living in my router? About the feasibility of botnet construction from embedded devices
By the advancement of technology and the spread...
09:45 - 09:50 - Break
10:35 - 10:50 - Break
10:50 - 11:35 - Vivek Ramachandran - Enterprise Wi+Fi Worms, Backdoors and Botnets for Fun and Profit
In this talk, we will explore how perfectly...
10:50 - 11:35 - Péter Bodor - „Social engineering” and psychology
The presentation examines the relation between...
11:35 - 11:40 - break
11:40 - 12:25 - Pavol Luptak - Cryptoanarchy after 19 years since Crypto Anarchist Manifesto
Completely anonymous cryptocurrency Bitcoin...
11:40 - 12:25 - Eszter Oroszi - Social Engineering - when the veil lifted
In my lecture my focus will shift from the...
12:25 - 13:20 - Launch break
13:20 - 14:05 - Zoltán Balázs - IPv6 shipworm + My little windows domain pwnie
The target is a company network, where inbound...
13:20 - 14:05 - László Biró - Stuxnet – Really the first one?
The way the Stuxnet worked was very similar to...
14:05 - 14:10 - break
14:10 - 14:55 - Péter Gyöngyösi Márton Illés - Firewalls and Exploits
Do firewalls cause a headache for hackers at...
14:10 - 14:55 - Yaniv Miron - SCADA Dismal, or, bang-bang SCADA
Water, Oil, Nuclear, Electric, The air you...
14:55 - 15:10 - Break
15:10 - 15:55 - Michele Orru - Dr. Strangelove or: How I Learned to Stop Worrying and Love the BeEF
Browser security is still one of the trickiest...
15:10 - 15:55 - Yaniv Miron - SCADA Hacking & Security Workshop
The participants will learn the basics of...
15:55 - 16:00 - break
16:00 - 16:45 - Marcell Major Mihály Zágon - Modern Browser Attack Vectors
The presentation is focusing on the analysis of...
16:00 - 16:45 - Balázs Beregnyei - From silicon layout to circuit diagram
I will demonstrate using an old 8 bits...
16:45 - 16:50 - break
16:50 - 17:35 - András Kabai - Malware analysis, tips and tricks
In this lecture I demonstrate how to elicit...