2018 2017 2016 2015 2014 2013 2012 2011 @Iasi 2011 @Bran




VIDEO (eng)

Alexandru BalanA new Hope - CTF stories & IoT Hacking
IoT Village Awards

Amit AshbelGame of Hacks: Play, Hack & Track

Andrei Costin (In)Security of Embedded Devices' Firmware – Fast and Furious at Large Scale
Hacking and Securing Network Monitoring Systems: End-to-end walkthrough example on Ganglia

Andrey LovyannikovIoT Security

Anton ProkhorovIoT Security

Beau WoodsFrom Hype Hangover to Happy Hacking: Shaping the World through Shaping Actions

Catalin CosoiA new Hope - CTF stories & IoT Hacking

Cosmin AnghelWhat's in a name? DNS use for exfiltration, and monitoring for detection

Costel Maxim Finding media bugs in Android using file format fuzzing

Cristian PatachiaWhite hat hacker bounty program to improve online environment security
Orange about Bug Bounty and Innovation Labs 2016

Danijel GrahELK stack for Hackers

David SanchoWhen Steganography Stops Being Cool

Georgia WeidmanIntegrating Mobile Devices into Your Penetration Testing Program

Gustavo GriecoToward large-scale vulnerability discovery using Machine Learning

Jayson StreetBreaking in Bad (I'm the one who doesn't knock)

Konrad JedrzejczykModern approaches to Wi-Fi attacks

Mohamed BedewiBuilding a Weaponized Honeybot (part I)
Building a Weaponized Honeybot (part II)

Omer CoskunWhy nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts

Paul CogginDefending the Enterprise Against Network Infrastructure Threats

Raul AlvarezChallenges on Reversing Layered Malware

Razvan-Costin IONESCUHow to mess with Android Intents

Robert KnappCryptography – our weapon in the 21st century
Rogerio Winter Luke 8:17 – Misleading implementations that compromise the privacy and information security
Abstract [email protected] Technique

Shah SheikhBuilding a Cyber Security Operations Center

Sneha RajguruPentesting Android Applications - Workshop

Teodor CimpoesuWhat's in a name? DNS use for exfiltration, and monitoring for detection

Tudor DamianIDS Evasion Techniques

Yury ChemerkinUntrusted Mobile Applications. State of Art of Security App-Apocalypse

Sponsors & Partners

They help us make this conference possible.

Stay Updated - Join Our Newsletter