Schedule

<Talks_That_Break_Boundaries/>

08:30

08:45

Lilla Szervátiusz – Opening Ceremony

08:45

09:25

Ignat Korchagin
Ignat Korchagin – What is Linux kernel keystore and why you should use it in your next application

09:30

10:10

Roland NagY – How to find rootkits in the Linux kernel

10:10

10:20

Cofee Break

10:20

11:00

Bálint Bianka
Bianka Bálint – Demystifying Internal Threat Intelligence

11:05

11:45

Marek Zmyslowski
Konrad Jędrzejczyk
Konrad Jędrzejczyk & Marek Zmyslowski – AI in Adversarial Hands
Masterminds and Machines

11:50

12:30

Tobias Schrödel
Tobias Schrödel – Real RansomChats
This session is LIVE ONLY and will not be recorded or accessible afterward.

12:30

13:30

Lunch Break

13:35

13:55

Szilárd Pfeiffer
Szilárd Pfeiffer – TOTP is not a silver bullet

14:00

14:40

Sean Hopkins – Full Stack Red Team
From Code to Hardware
This session is LIVE ONLY and will not be recorded or accessible afterward.

14:40

14:50

Reboot

14:50

15:30

Vikas Khanna
Vikas Khanna – Unlocking the Gates
Understanding Authentication Bypass Vulnerabilities

15:35

16:15

Dániel Markovics
János Kovács
Dominik Maksa
Dániel Markovics, János Kovács, Maksa Dominik – Where the treasure is
Security Scanning the DICOM stack of Medical IT environments

16:20

17:00

M. Shahmeer Amir
Shahmeer Amir – Hack the Sky
Exploring Satellite Vulnerabilities and Cyber Threats

17:05

17:45

Marta Janus
Marta Janus – AI Security Landscape
Tales and Techniques from the Frontlines

17:50

18:10

Gábor Arányi – Challenges while developing a ransomware-proof backup solution

18:15

18:20

Attila Marosi-Bauer – Closing notes

08:45

09:25

Aurelio Picon Lopez
Aurelio Picon Lopez – At Home with the Enemy
How APTs Weaponize IoT Devices as Residential Proxies

09:30

10:10

József Ottucsak
JÓzsef Ottucsak– The Big Software Supply Chain Security Problem

10:10

10:20

Cofee Break

10:20

11:00

Chen Shiri – How I took over two platforms of Google including Google Cloud, Google Collaboratory and Used It on Gemini AI

11:05

11:45

DÁniel HegeDűs – Anti-Bot Measures Gone Wild
The Rise of Legitimate Malware

11:50

12:30

Vincenzo Santucci
Vincenzo Santucci – Revamping Reflection
Enhancing the Timeless Concept of Reflective Loading

12:30

13:30

Lunch Break

13:35

13:55

Matthias Kesenheimer
Dr. Matthias Keisenheimer – Your SoC implements a glitch detector?
Hold my beer!

14:00

14:40

Giorgio Perticone
Giorgio Perticone – Crafting effective Security Operations tactics
Deep Dive Forensics VS Rapid Response

14:40

14:50

Reboot

14:50

15:30

Ananda Krishna
Anand Sreekumar
Ananda Krishna, Anand Sreekumar – Ghost Math: Syscall-Only Injection, Deterministic Shellcode & QUIC C2
A Full Kill-Chain that Slipped Past CrowdStrike Falcon

15:35

16:15

Gabor Fuchs – Targeted Attacks on the TLSH Similarity Digest Scheme

16:20

17:00

Shubham Kumar
Sagar Tiwari
Shubham Kumar, Sagar Tiwari – Dark Ships & Transparent Seas
Tracking Vessels with Open-Source Intelligence

17:05

17:45

Balázs Gerlei
Balázs Gerlei – Don’t let attackers exploit your Android app via Intents

room Nr. 4

09:00

11:00

Santi Abastante
Santi Abastante – Attacking AWS
From initial access to hardcore persistance

11:15

13:15

William Robinet – In bed with Qubes OS
tips & tricks exchange party

13:30

15:30

Thomas Fischer
Thomas Fischer – Masterclass connecting your car

room Nr. 1

09:00

11:00

Fs00ciety – Spoofed Skies and Signal Lies
Tracking Aircraft and Unmasking Deception in the Age of GPS War

11:15

13:15

Kirils Solovjovs – So you’re interested in social engineering?
The very first steps

13:30

15:30

Craig Balding – Pair Programming with Aider to Create High-Performance Web Security Tools

room Nr. 8

09:00

17:45

Hackathon

room Nr. 7

09:00

17:45

hackcenter