Summary of SUMMARY 2022

<support_the_future_generation/>

Thank you for joining us at this year’s IT Security Conference!

Your insights and participation made this event a success.
We look forward to seeing you again next year as we continue shaping the future of cybersecurity!

SPONSORS

PRESENTATIONS

Presentation Title

Youtube link

Henrik Kramselund

DDoS Testing Your Infrastructure, including IPv6 SYN floods

Ignacio Navarro

No Parking, No Problem!

Marc Rivero López

Applying ATT&CK to Analyze Ransomware Campaigns

Márk Módly

Everyday Numbers to Break Not So Everyday Software

Watch the Talk

Dimitrios Valsamaras

How an Android Application can Drain Your Wallet?

Watch the Talk

Piotr Głaska

How Attackers Abused DNS in 2021/2022

András Kabai & László Tóth

Broad View to Automotive Security & Pentesting

Keziah Plattner & Kadia Mashal

Sisyphus and the CVE Feed

Grzegorz Tworek

Hacking AppLocker Cache

Pierre Delcher

A GREAT Sewing Workshop

Domokos Nagy

Spin That Steering Wheel

Csongor Ferenczi

Security Assesment of Embedded Firewalls

Paul Coggin

Pwned in Space

Zoltán Balázs

Web3 + Scams = It’s a Match!

András Kabai

Fault Injection (FI) Attacks Against Embedded Systems

Kerekasztal Beszélgetés (HUN)

Bug Bounty és Responsible Disclosure a Változó Kibertér árnyékában

Gergely Révay

Automating Binary Analysis with Ghidra’s P-Code

Szilárd Pfeiffer

A New Default Value of OpenSSL could Multiply a DoS Potential

Kurt Baumgartner & Georgy Kucherin

DiceyF Deploys the GamePlayerFramework

Albert Zsigovits & Robert Neumann

From Red to Black and Beyond…

Mateusz Olejarka

Developer in a Digital Crosshair, 2022 Edition

István Tóth

Practical EDR Bypass Methods in 2022

József Ottucsák

How to Kickstart a Security Program?

Tomas Votruba

How Instantly Upgrade Your Legay Code in Minutes?

Mirza Burhan Baig

What are We Missing in Web Applications?

Márton Illés

Making Sense of Firmware Images

János Kepics

Security in IoT – the Investigation of Bluetooth Low Energy

Barak Sternberg

Wild IoT Tales: from Hacking Power Grids to Oil Pipelines!

Roland Nagy

Fuzzing Trusted Applications in OP-TEE via Shared Memory

Chloé Messdaghi

Cybersecurity Cannot Ignore Climate Change

Péter Venesz & Giuseppe Serio

Automotive Threat Intelligence…

Ali Abdollahi

Metaverse (in)Security

Mirza Burhan Baig

The Great Hospital Hack !!