2017 2016 2015 2014 2013 2012 2011 @Iasi 2011 @Bran

SPEAKER

PRESENTATION

SLIDES

VIDEO (eng)

Adrian FurtunaPentest-Tools.com - The first online penetration testing framework
-
Adrian HadaEternal Blues with EternalBlue


Alexandru AriciuBlackBox Debugging of Embedded Systems


Alexandru MusatSharper than a Phisher's Hook - The Story of an Email Autopsy


Alexandru StoianIncident Busters. A 2017 retrospective


Alexandru SudituEvolution of threats to Electric Power Grid Operations


Alexey OsipovATM: every day trouble


Alin PuncioiuFileless malware - beyond a cursory glance


April C WrightOrange is the New Purple - How and Why to Integrate Development Teams with Red/Blue Teams to Build More Secure Software


Arun ManeICS Humla


Bogdan SimionAre we alone in our infrastructure? A look into the dark corners of endpoints with Hubble.


Carel van RooyenAttacking Mongoose OS on Xtensa platforms


Catalin PatrascuIncident Busters. A 2017 retrospective


Cosmin RaduWeaponized RaspberryPi in Red Team Engagements


Dan DemeterBack to the IoT Future: Where Marty controls all your routers


Daniel BarbuSplunking the Clouds: finding the needle in AWS & Azure.


Daniel TomescuMinute-hacks against Robi the Robot


David WongSHA-3 vs the world


Dorin EnacheRoad to ECSC 2017


Dr.-Ing. Martin PohlackKeeping customer data safe in EC2 – a deep dive


Gabriel CirligDrive safely on the internet lane: how smart cars can leak your data
-
Inbar RazIn Soviet Russia, Vulnerability Finds You
--
Ionut MarinSharper than a Phisher's Hook - The Story of an Email Autopsy


Irina NicolaeEfficient Defenses Against Adversarial Examples for Deep Neural Networks


J Wolfgang GoerlichSecuring without Slowing


John TorakisUnexpected Shells with "covertutils"


Kirill ShipulinTurning IDS signatures against an IDS itself: a new evasion technique


Konrad JędrzejczykAre you keeping up with the Commodore, 'cause the Commodore is keeping up with you!


Lucian SararuFileless malware - beyond a cursory glance


Mihai VasilescuIoT botnets? How do they work?


Mike SpicerWhat the WiFiCactus?!?!?!


Mohamed BedewiActive Defense Untangled


Neculai Balaban Road to ECSC 2017


Olga KochetovaATM: every day trouble


Paul CogginTwisting Layer 2 Protocols


Philipp PromeuschelAttacking Mongoose OS on Xtensa platforms


Ralf C. StaudemeyerSmart Cities under Attack: Cybercrime and Technology Response
-
Raul AlvarezHijacking the Boot Process - Ransomware Style


René FreingruberFuzzing closed source applications


Sabin POTÎRCĂRemote Attacks against IoT
-
Sneha RajguruICS Humla


Stefan NiculaMinute-hacks against Robi the Robot


Stefan TanaseDrive safely on the internet lane: how smart cars can leak your data
-
Steve McGregoryThe Business of Cybersecurity: Life-Lessons Learned


Tudor DamianGDPR - T minus 6 months. Are you ready?


Uzoma OGBONNASplunking the Clouds: finding the needle in AWS & Azure.


Vlad SoriciSupporting innovation in cybersecurity through acceleration program – Orange Fab


Vladimir TaratushkaBug bounty conspiracy and 50 shades of gray hat. Who owns the vulnerability?


Walter BelgersLockpicking and IT Security


Yehia MamdouhYou Fail in SE If You Make Those Mistakes


Yury ChemerkinThe rise of security assistants over security audit services



Sponsors & Partners

They help us make this conference possible.

Stay Updated - Join Our Newsletter