Programs

1 . day, 17. September 2011.

Security Theater
Security Dome
08:00 - 09:00
Registration
09:00 - 09:15
Opening
09:15 - 10:15 Peter Szor
Keynote - Fighting Computer Malware
The PC computer virus problem is 25 years old...
09:15 - 10:15 Peter Szor
Keynote - Fighting Computer Malware
The PC computer virus problem is 25 years old...
10:15 - 10:25
break
10:25 - 11:10 Csaba Barta
Forensic analysis of NTDS.DIT
The presentation introduces a software...
10:25 - 11:10 Zsolt Illési
IT as evidence from forensics perspective
Different areas of law have different...
11:10 - 11:15
break
11:15 - 12:00 Joe McCray
There's An App For That: Pentesting Mobile Applications
- Using Android/iPod/iPhone/iPad as a Pentest...
11:15 - 12:00 Dr. Tibor Peszleg
What to do when the problem is on board?
Points of consideration will be given for...
12:00 - 12:05
break
12:05 - 12:50 Alexander Kornbrust
Oracle Forensic
The talk is about Oracle forensic and how...
12:05 - 12:50 Zoltán Alexin
Big Hungarian Health Databases
Medical data belong to the special categories...
12:50 - 13:30
Launch break
13:30 - 14:15 Ákos Subecz Csaba Zánthó
Lockpicking – the finest art of opening locks
In my presentation I will introduce the...
13:30 - 14:15 Ferenc Leitold, Ph.D Botond Horváth
Internet in the sandbox
Nowadays most malware incidents are related to...
14:15 - 14:20
Break
14:20 - 15:05 Ertunga Arsal
Rootkits and Trojans on Your SAP Landscape
In this lecture I present several attack paths...
14:20 - 15:05 Győző Kovács
My Assorted Wanderings in IT
For instance when John von Neumann designed the...
15:05 - 15:10
Break
15:10 - 15:55 László Tóth
Almost invisible cloak in Oracle databases or the “undocumented” helps us again
In this presentation László goes further and...
15:10 - 15:55 Dániel Muszka
The Kalmár Era in Szeged
László Kalmár was not only a scientist and...
15:55 - 16:15
Break
16:15 - 17:00 András Veres-Szentkirályi
Hacking hardware for fun and profit
In my lecture I show Ardunio's ecosystem and I...
 
17:00 - 17:05
break
17:05 - 17:50 Felix Schuster
Design and implementation of an additional layer of encryption for Skype
The presentation will describe the major...
17:05 - 17:50 Arnold Őszi Csaba Otti
Fingerprint identification systems, security or security leak
We need to make a copy of a person’s finger...
17:50 - 17:55
Break
17:55 - 18:40 Péter Gara-Tarnóczi
Customizing Public Exploits
In my presentation, I show you how to improve...

2 . day, 18. September 2011.

Security Theater
Security Dome
09:45 - 09:50
Break
10:35 - 10:50
Break
10:50 - 11:35 Vivek Ramachandran
Enterprise Wi+Fi Worms, Backdoors and Botnets for Fun and Profit
In this talk, we will explore how perfectly...
10:50 - 11:35 Péter Bodor
„Social engineering” and psychology
The presentation examines the relation between...
11:35 - 11:40
break
11:40 - 12:25 Pavol Luptak
Cryptoanarchy after 19 years since Crypto Anarchist Manifesto
Completely anonymous cryptocurrency Bitcoin...
11:40 - 12:25 Eszter Oroszi
Social Engineering - when the veil lifted
In my lecture my focus will shift from the...
12:25 - 13:20
Launch break
13:20 - 14:05 Zoltán Balázs
IPv6 shipworm + My little windows domain pwnie
The target is a company network, where inbound...
13:20 - 14:05 László Biró
Stuxnet – Really the first one?
The way the Stuxnet worked was very similar to...
14:05 - 14:10
break
14:10 - 14:55 Péter Gyöngyösi Márton Illés
Firewalls and Exploits
Do firewalls cause a headache for hackers at...
14:10 - 14:55 Yaniv Miron
SCADA Dismal, or, bang-bang SCADA
Water, Oil, Nuclear, Electric, The air you...
14:55 - 15:10
Break
15:10 - 15:55 Michele Orru
Dr. Strangelove or: How I Learned to Stop Worrying and Love the BeEF
Browser security is still one of the trickiest...
15:10 - 15:55 Yaniv Miron
SCADA Hacking & Security Workshop
The participants will learn the basics of...
15:55 - 16:00
break
16:00 - 16:45 Marcell Major Mihály Zágon
Modern Browser Attack Vectors
The presentation is focusing on the analysis of...
16:00 - 16:45 Balázs Beregnyei
From silicon layout to circuit diagram
I will demonstrate using an old 8 bits...
16:45 - 16:50
break
16:50 - 17:35 András Kabai
Malware analysis, tips and tricks
In this lecture I demonstrate how to elicit...
 
17:35 - 17:50
Conference closure and farewell

Sponsors:

Diamond
Bronze