Home
Conference
Schedule
Speakers
Venue
Visit Bucharest
Call for Papers
Hacking Village
Competitions
D-CTF 2018
Defend the Castle
Ariadne’s Thread 3.0 CTF
8bit hack
IoT Village
Critical Infrastructure Attack
Down the Rabbit Hole
Bob, the Hacker Bot
EA – Lazy Dave
Hack the Bank
WiFI PWNED Board
Target John
Lock Picking Village
Bug Bounty
Passport to Prizes
Call for Contests
Partners
Who is Hiring
Technologies
Become our Partner
Blog
About
About
Conference Committee
The Team
Contact
Call for Volunteers
Terms and Conditions
Archive
DefCamp 2018
DefCamp 2017
DefCamp 2016
DefCamp 2015
DefCamp 2014
DefCamp 2013
DefCamp 2012
DefCamp 2011 Iasi
DefCamp 2011 Bran
Home
Conference
Schedule
Speakers
Venue
Visit Bucharest
Call for Papers
Hacking Village
Competitions
D-CTF 2018
Defend the Castle
Ariadne’s Thread 3.0 CTF
8bit hack
IoT Village
Critical Infrastructure Attack
Down the Rabbit Hole
Bob, the Hacker Bot
EA – Lazy Dave
Hack the Bank
WiFI PWNED Board
Target John
Lock Picking Village
Bug Bounty
Passport to Prizes
Call for Contests
Partners
Who is Hiring
Technologies
Become our Partner
Blog
About
About
Conference Committee
The Team
Contact
Call for Volunteers
Terms and Conditions
Archive
DefCamp 2018
DefCamp 2017
DefCamp 2016
DefCamp 2015
DefCamp 2014
DefCamp 2013
DefCamp 2012
DefCamp 2011 Iasi
DefCamp 2011 Bran
Archives
Home
»
Archives
2018
2017
2016
2015
2014
2013
2012
2011 @Iasi
2011 @Bran
SPEAKER
PRESENTATION
SLIDES
VIDEO (eng)
Alexandru Balan
A new Hope - CTF stories & IoT Hacking
IoT Village Awards
Amit Ashbel
Game of Hacks: Play, Hack & Track
Andrei Costin
(In)Security of Embedded Devices' Firmware – Fast and Furious at Large Scale
Hacking and Securing Network Monitoring Systems: End-to-end walkthrough example on Ganglia
Andrey Lovyannikov
IoT Security
Anton Prokhorov
IoT Security
Beau Woods
From Hype Hangover to Happy Hacking: Shaping the World through Shaping Actions
Catalin Cosoi
A new Hope - CTF stories & IoT Hacking
Cosmin Anghel
What's in a name? DNS use for exfiltration, and monitoring for detection
Costel Maxim
Finding media bugs in Android using file format fuzzing
Cristian Patachia
White hat hacker bounty program to improve online environment security
Orange about Bug Bounty and Innovation Labs 2016
Danijel Grah
ELK stack for Hackers
David Sancho
When Steganography Stops Being Cool
Georgia Weidman
Integrating Mobile Devices into Your Penetration Testing Program
Gustavo Grieco
Toward large-scale vulnerability discovery using Machine Learning
Jayson Street
Breaking in Bad (I'm the one who doesn't knock)
Konrad Jedrzejczyk
Modern approaches to Wi-Fi attacks
Mohamed Bedewi
Building a Weaponized Honeybot (part I)
Building a Weaponized Honeybot (part II)
Omer Coskun
Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts
Paul Coggin
Defending the Enterprise Against Network Infrastructure Threats
Raul Alvarez
Challenges on Reversing Layered Malware
Razvan-Costin IONESCU
How to mess with Android Intents
Robert Knapp
Cryptography – our weapon in the 21st century
-
Rogerio Winter
Luke 8:17 – Misleading implementations that compromise the privacy and information security
Abstract
[email protected]
Technique
Shah Sheikh
Building a Cyber Security Operations Center
Sneha Rajguru
Pentesting Android Applications - Workshop
Teodor Cimpoesu
What's in a name? DNS use for exfiltration, and monitoring for detection
Tudor Damian
IDS Evasion Techniques
Yury Chemerkin
Untrusted Mobile Applications. State of Art of Security App-Apocalypse
Sponsors & Partners
They help us make this conference possible.
Event Powered By
Platinum Partners
Gold Partners
Silver Partners
Gaming Partner
Bronze Partners
Community & Media Partners
BECOME OUR PARTNER
Stay Updated - Join Our Newsletter
Leave this field empty if you're human:
Copyright @ 2011 - 2018
Cyber Security Research Center from Romania - CCSIR
. All Rights Reserved.
We use cookies during your browsing experience. You can learn more from our Privacy Policy and Cookies Policy.
Accept
Read More