2018 2017 2016 2015 2014 2013 2012 2011 @Iasi 2011 @Bran

SPEAKER

PRESENTATION

SLIDES

VIDEO (eng)

Abdullah JosephStealing Traffic: Analyzing a Mobile Fraud
Intro to Reversing Malware




Adrian FurtunaLet's Make Pentesting Fun Again! Report writing in 5 minutes.


Adrian HadaApplying Fuzzy Hashing to Phishing Page Identification (Lightning Talk)
From Mirai to Monero – One Year’s Worth of Honeypot Data




Adrian TudorCatch Me If You Can - Finding APTs in your network


Alex “Jay” BalanPrivacy: Between Hype and Need


Alex NegreaWeb Isolation 101: Securing Web Apps against data exfiltration and shielding corporate endpoints from web-borne threats


Andrei CostinIoT Malware: Comprehensive Survey, Analysis Framework and Case Studies


Arun ManeBackdooring DVR/NVR devices
-
Bozeanu AndreiThe lions and the watering hole


Cosmin AnghelBack to the future: how to respond to threats against ICS environments.
-
Cosmin RaduBurp-ing through your cryptography shield


Cotaie AndreiWeaponizing Neural Networks. In your browser!


Cristian Pațachia-SultănoiuOpening Speech


Dan DemeterThe Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False Flags


Daniel TomescuOne year after a major attack
-
Dimitri van de GiessenWhat happened behind the closed doors at MS


Dmitry SklyarWe will charge you. How to [b]reach vendor’s network using EV charging station.


Gabriel CirligAutoHotKey Malware – The New AutoIT
Applying Honey to the Pot - The Saga of Port 5555 (Lightning Talk)
-

Gabriel TanaseOne year after a major attack
-
Georg KnablTailored, Machine Learning-driven Password Guessing Attacks and Mitigation


Ioan ConstantinNeedles, Haystacks and Algorithms: Using Machine Learning to detect complex threats


Ioan IacobIn search of unique behaviour


Ionut GeorgescuBack to the future: how to respond to threats against ICS environments.
-
Ionut-Cristian BucurTor .onions: The Good, The Rotten and The Misconfigured


Ivan PetrovTiming attacks against web applications: Are they still practical?


Jan KoprivaOSSTMM: The “Measure, Don’t Guess” Security Testing Methodology
Open Directories: Sensitive data (not) hiding in plain sight



Jayson E. StreetYou're right, this talk isn't really about you!
-
Jelena MilosevicThe challenge of building a secure and safe digital environment in healthcare


Jesper LarssonSecurity pitfalls in script-able infrastructure pipelines.


Khalil BijjouWell, that escalated quickly! - a penetration tester's approach to privilege escalation


Kirill PuzankovMobile signaling threats and vulnerabilities - real cases and statistics from our experience


Konrad JędrzejczykWiFi practical hacking "Show me the passwords!"


Leo NeaguCatch Me If You Can - Finding APTs in your network


Maksim IavichLattice based Merkle for post-quantum epoch


Manuel WiesingerCPU vulnerabilities - where are we now?


Marek ZmysłowskiHow to Fuzz like a Hacker


Marius BucurIn search of unique behaviour


Mihai VasilescuFrom Mirai to Monero – One Year’s Worth of Honeypot Data


Mike SpicerYear of the #WiFiCactus


Mircea NenciuTrust, but verify – Bypassing MFA


Muhammad Mudassar YaminImplementation of information security techniques on modern android based Kiosk ATM/remittance machines


Mushegh HakhinianBuilding application security with 0 money down


Neil “Grifter” WylerThreat Hunting: From Platitudes to Practical Application


Octavian GuzuHacking at the ECSC
-
Radu-Emanuel ChiscariuDrupalgeddon 2 – Yet Another Weapon for the Attacker


Raluca StanciuEconomical Denial of Sustainability in the Cloud (EDOS)


Razvan BocuSecure and privacy-preserving data transmission and processing using homomorphic encryption


Razvan TodorBridging the gap between CyberSecurity R&D and UX


Stefan MitroiTrust, but verify – Bypassing MFA


Stefan TanaseInternet Balkanization: Why Are We Raising Borders Online?


Stefan ZarinschiThe Charter of Trust


Stephan GerlingRemote Yacht Hacking


Tiberiu BorosWeaponizing Neural Networks. In your browser!


Yury ChemerkinMobile, IoT, Clouds… It’s time to hire your own risk manager!



Sponsors & Partners

They help us make this conference possible.

Stay Updated - Join Our Newsletter