Home
Conference
Schedule
Speakers
Venue
Visit Bucharest
Call for Papers
Hacking Village
Competitions
D-CTF 2017
Defend the Castle
Ariadne’s Thread 2.0 CTF
IoT Village
Critical Infrastructure Attack
ICS Humla CTF
Hack the Bank
WiFI PWNED Board
Target John
Passport to Prizes
Call for Contests
Partners
Who is Hiring
Technologies
Become our Partner
Blog
About
About
The Team
Contact
Call for Volunteers
Terms and Conditions
Archive
DefCamp 2017
DefCamp 2016
DefCamp 2015
DefCamp 2014
DefCamp 2013
DefCamp 2012
DefCamp 2011 Iasi
DefCamp 2011 Bran
Tickets
Home
Conference
Schedule
Speakers
Venue
Visit Bucharest
Call for Papers
Hacking Village
Competitions
D-CTF 2017
Defend the Castle
Ariadne’s Thread 2.0 CTF
IoT Village
Critical Infrastructure Attack
ICS Humla CTF
Hack the Bank
WiFI PWNED Board
Target John
Passport to Prizes
Call for Contests
Partners
Who is Hiring
Technologies
Become our Partner
Blog
About
About
The Team
Contact
Call for Volunteers
Terms and Conditions
Archive
DefCamp 2017
DefCamp 2016
DefCamp 2015
DefCamp 2014
DefCamp 2013
DefCamp 2012
DefCamp 2011 Iasi
DefCamp 2011 Bran
Tickets
Archives
Home
»
Archives
2017
2016
2015
2014
2013
2012
2011 @Iasi
2011 @Bran
SPEAKER
PRESENTATION
SLIDES
VIDEO (eng)
Adrian Furtuna
Pentest-Tools.com - The first online penetration testing framework
-
Adrian Hada
Eternal Blues with EternalBlue
Alexandru Ariciu
BlackBox Debugging of Embedded Systems
Alexandru Musat
Sharper than a Phisher's Hook - The Story of an Email Autopsy
Alexandru Stoian
Incident Busters. A 2017 retrospective
Alexandru Suditu
Evolution of threats to Electric Power Grid Operations
Alexey Osipov
ATM: every day trouble
April C Wright
Orange is the New Purple - How and Why to Integrate Development Teams with Red/Blue Teams to Build More Secure Software
Arun Mane
ICS Humla
Bogdan Simion
Are we alone in our infrastructure? A look into the dark corners of endpoints with Hubble.
Carel van Rooyen
Attacking Mongoose OS on Xtensa platforms
Catalin Patrascu
Incident Busters. A 2017 retrospective
Cosmin Radu
Weaponized RaspberryPi in Red Team Engagements
Dan Demeter
Back to the IoT Future: Where Marty controls all your routers
Daniel Barbu
Splunking the Clouds: finding the needle in AWS & Azure.
Daniel Tomescu
Minute-hacks against Robi the Robot
David Wong
SHA-3 vs the world
Dorin Enache
Road to ECSC 2017
Dr.-Ing. Martin Pohlack
Keeping customer data safe in EC2 – a deep dive
Gabriel Cirlig
Drive safely on the internet lane: how smart cars can leak your data
-
Inbar Raz
In Soviet Russia, Vulnerability Finds You
-
-
Ionut Marin
Sharper than a Phisher's Hook - The Story of an Email Autopsy
Irina Nicolae
Efficient Defenses Against Adversarial Examples for Deep Neural Networks
J Wolfgang Goerlich
Securing without Slowing
John Torakis
Unexpected Shells with "covertutils"
Kirill Shipulin
Turning IDS signatures against an IDS itself: a new evasion technique
Konrad Jędrzejczyk
Are you keeping up with the Commodore, 'cause the Commodore is keeping up with you!
Lucian Sararu
Fileless malware - beyond a cursory glance
Mihai Vasilescu
IoT botnets? How do they work?
Mike Spicer
What the WiFiCactus?!?!?!
Mohamed Bedewi
Active Defense Untangled
Neculai Balaban
Road to ECSC 2017
Olga Kochetova
ATM: every day trouble
Paul Coggin
Twisting Layer 2 Protocols
Philipp Promeuschel
Attacking Mongoose OS on Xtensa platforms
Ralf C. Staudemeyer
Smart Cities under Attack: Cybercrime and Technology Response
-
Raul Alvarez
Hijacking the Boot Process - Ransomware Style
René Freingruber
Fuzzing closed source applications
Sabin POTÎRCĂ
Remote Attacks against IoT
-
Sneha Rajguru
ICS Humla
Stefan Nicula
Minute-hacks against Robi the Robot
Stefan Tanase
Drive safely on the internet lane: how smart cars can leak your data
-
Steve McGregory
The Business of Cybersecurity: Life-Lessons Learned
Tudor Damian
GDPR - T minus 6 months. Are you ready?
Uzoma OGBONNA
Splunking the Clouds: finding the needle in AWS & Azure.
Vlad Sorici
Supporting innovation in cybersecurity through acceleration program – Orange Fab
Walter Belgers
Lockpicking and IT Security
Yehia Mamdouh
You Fail in SE If You Make Those Mistakes
Yury Chemerkin
The rise of security assistants over security audit services
Sponsors & Partners
They help us make this conference possible.
Event Powered By
Platinum Sponsor
Gold Sponsor
Silver Sponsors
Bronze Sponsors
Community & Media Partners
BECOME OUR PARTNER
Stay Updated - Join Our Newsletter
Leave this field empty if you're human:
Copyright @ 2011 - 2018
Cyber Security Research Center from Romania - CCSIR
. All Rights Reserved.