2018 2017 2016 2015 2014 2013 2012 2011 @Iasi 2011 @Bran

SPEAKER

PRESENTATION

SLIDES

VIDEO (eng)

Abdullah JosephStealing Traffic: Analyzing a Mobile Fraud
Intro to Reversing Malware




Adrian FurtunaLet's Make Pentesting Fun Again! Report writing in 5 minutes.


Adrian HadaApplying Fuzzy Hashing to Phishing Page Identification (Lightning Talk)
From Mirai to Monero – One Year’s Worth of Honeypot Data




Adrian TudorCatch Me If You Can - Finding APTs in your network


Alex “Jay” BalanPrivacy: Between Hype and Need


Alex NegreaWeb Isolation 101: Securing Web Apps against data exfiltration and shielding corporate endpoints from web-borne threats


Andrei CostinIoT Malware: Comprehensive Survey, Analysis Framework and Case Studies


Arun ManeBackdooring DVR/NVR devices
-
Bozeanu AndreiThe lions and the watering hole


Cosmin AnghelBack to the future: how to respond to threats against ICS environments.
-
Cosmin RaduBurp-ing through your cryptography shield


Cotaie AndreiWeaponizing Neural Networks. In your browser!


Cristian Pațachia-SultănoiuOpening Speech


Dan DemeterThe Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False Flags


Daniel TomescuOne year after a major attack
-
Dimitri van de GiessenWhat happened behind the closed doors at MS


Dmitry SklyarWe will charge you. How to [b]reach vendor’s network using EV charging station.


Gabriel CirligAutoHotKey Malware – The New AutoIT
Applying Honey to the Pot - The Saga of Port 5555 (Lightning Talk)
-

Gabriel TanaseOne year after a major attack
-
Georg KnablTailored, Machine Learning-driven Password Guessing Attacks and Mitigation


Ioan ConstantinNeedles, Haystacks and Algorithms: Using Machine Learning to detect complex threats


Ioan IacobIn search of unique behaviour


Ionut GeorgescuBack to the future: how to respond to threats against ICS environments.
-
Ionut-Cristian BucurTor .onions: The Good, The Rotten and The Misconfigured


Ivan PetrovTiming attacks against web applications: Are they still practical?


Jan KoprivaOSSTMM: The “Measure, Don’t Guess” Security Testing Methodology
Open Directories: Sensitive data (not) hiding in plain sight



Jayson E. StreetYou're right, this talk isn't really about you!
-
Jelena MilosevicThe challenge of building a secure and safe digital environment in healthcare


Jesper LarssonSecurity pitfalls in script-able infrastructure pipelines.


Khalil BijjouWell, that escalated quickly! - a penetration tester's approach to privilege escalation


Kirill PuzankovMobile signaling threats and vulnerabilities - real cases and statistics from our experience


Konrad JędrzejczykWiFi practical hacking "Show me the passwords!"


Leo NeaguCatch Me If You Can - Finding APTs in your network


Maksim IavichLattice based Merkle for post-quantum epoch


Manuel WiesingerCPU vulnerabilities - where are we now?


Marek ZmysłowskiHow to Fuzz like a Hacker


Marius BucurIn search of unique behaviour


Mihai VasilescuFrom Mirai to Monero – One Year’s Worth of Honeypot Data


Mike SpicerYear of the #WiFiCactus


Mircea NenciuTrust, but verify – Bypassing MFA


Muhammad Mudassar YaminImplementation of information security techniques on modern android based Kiosk ATM/remittance machines


Mushegh HakhinianBuilding application security with 0 money down


Neil “Grifter” WylerThreat Hunting: From Platitudes to Practical Application


Octavian GuzuHacking at the ECSC
-
Radu-Emanuel ChiscariuDrupalgeddon 2 – Yet Another Weapon for the Attacker


Raluca StanciuEconomical Denial of Sustainability in the Cloud (EDOS)


Razvan BocuSecure and privacy-preserving data transmission and processing using homomorphic encryption


Razvan TodorBridging the gap between CyberSecurity R&D and UX


Stefan MitroiTrust, but verify – Bypassing MFA


Stefan TanaseInternet Balkanization: Why Are We Raising Borders Online?


Stefan ZarinschiThe Charter of Trust


Stephan GerlingRemote Yacht Hacking


Tiberiu BorosWeaponizing Neural Networks. In your browser!



Sponsors & Partners

They help us make this conference possible.

Stay Updated - Join Our Newsletter