2017 2016 2015 2014 2013 2012 2011 @Iasi 2011 @Bran

SPEAKER

PRESENTATION

SLIDES

VIDEO (eng)

Adrian HadaFrom Threat Intelligence to Rapsheets in just a few steps


Alin BoncioagaInterPlanetary File System (IPFS)


Amihai NeidermanHow I hacked my city
DVB-T Hacking
-

Andrei BozeanuDetecting Drive-By Attacks by Analyzing Malicious Javascript in Big Data Environments


Axelle ApvrilleInfecting Internet of Things


Bryson LoughmillerThreat Intelligence! DIY!


Ciprian BofOnline Alter Ego - A Simple Button for Military Security


Cristian DrigaKnock knock.." "Who's there?" .."The Law! Open up!


Cristian Pațachia-SultănoiuSecurity through open innovation and data sharing


Cristian SanduSecurity of Mobile Cryptocoin Wallets


Cristian ZahariaSocial Engineering - Security through education


Daniel BarbuThreat Intelligence! DIY!


Dave ChronisterSplit Personalities: The Psychology of Social Engineering


David JacobyReal-world Lessons about Spies Every Security Researcher Should Know
--
Dragos ComaneciFrom Threat Intelligence to Rapsheets in just a few steps


Gabriel TanaseTesters vs Writers: pentests quality in assurance projects


Inbar RazDo Tinder Bots Dream of Electric Toys?


Ionut PopescuWindows shellcodes: To be continued


Jayson E. Street…And bad mistakes…I've made a few…
-
Kereszturi LaszloMoving forward with cybersecurity


Khalil BijjouWeb Application Firewall Bypassing


Mark FelegyhaziBad software is eating the world! Let's fix it!


Matt SuicheFollow the Money.
-
Mihai NeaguBrowser instrumentation for exploit analysis


Mohamed BedewiCrafting the Unavoidable


Ovidiu DiaconescuOnline Alter Ego - A Simple Button for Military Security


Raul AlvarezReversing a Polymorphic File-Infecting Ransomware


Raul PopaMaking hacking and social engineering harder with typing biometrics.


Stefan TanaseReal-world Lessons about Spies Every Security Researcher Should Know
--
Tobias MuellerFunctionality, Security, Usability: Choose any two. Or GNOME.


Vlad SoriciSecuring the Openness. The operator challenge.


Yehia Mamdouh ElGhalySE–ُ Exploit by improvisación


Yury ChemerkinRiskware Betrayer. Who is the biggest one?



Sponsors & Partners

They help us make this conference possible.

Stay Updated - Join Our Newsletter