2018 2017 2016 2015 2014 2013 2012 2011 @Iasi 2011 @Bran




VIDEO (eng)

Abdullah JosephStealing Traffic: Analyzing a Mobile Fraud
Intro to Reversing Malware

Adrian FurtunaLet's Make Pentesting Fun Again! Report writing in 5 minutes.

Adrian HadaApplying Fuzzy Hashing to Phishing Page Identification (Lightning Talk)
From Mirai to Monero – One Year’s Worth of Honeypot Data

Adrian TudorCatch Me If You Can - Finding APTs in your network

Alex “Jay” BalanPrivacy: Between Hype and Need

Alex NegreaWeb Isolation 101: Securing Web Apps against data exfiltration and shielding corporate endpoints from web-borne threats

Andrei CostinIoT Malware: Comprehensive Survey, Analysis Framework and Case Studies

Arun ManeBackdooring DVR/NVR devices
Bozeanu AndreiThe lions and the watering hole

Cosmin AnghelBack to the future: how to respond to threats against ICS environments.
Cosmin RaduBurp-ing through your cryptography shield

Cotaie AndreiWeaponizing Neural Networks. In your browser!

Cristian Pațachia-SultănoiuOpening Speech

Dan DemeterThe Hitchhiker's Guide to Disinformation, Public Opinion Swinging and False Flags

Daniel TomescuOne year after a major attack
Dimitri van de GiessenWhat happened behind the closed doors at MS

Dmitry SklyarWe will charge you. How to [b]reach vendor’s network using EV charging station.

Gabriel CirligAutoHotKey Malware – The New AutoIT
Applying Honey to the Pot - The Saga of Port 5555 (Lightning Talk)

Gabriel TanaseOne year after a major attack
Georg KnablTailored, Machine Learning-driven Password Guessing Attacks and Mitigation

Ioan ConstantinNeedles, Haystacks and Algorithms: Using Machine Learning to detect complex threats

Ioan IacobIn search of unique behaviour

Ionut GeorgescuBack to the future: how to respond to threats against ICS environments.
Ionut-Cristian BucurTor .onions: The Good, The Rotten and The Misconfigured

Ivan PetrovTiming attacks against web applications: Are they still practical?

Jan KoprivaOSSTMM: The “Measure, Don’t Guess” Security Testing Methodology
Open Directories: Sensitive data (not) hiding in plain sight

Jayson E. StreetYou're right, this talk isn't really about you!
Jelena MilosevicThe challenge of building a secure and safe digital environment in healthcare

Jesper LarssonSecurity pitfalls in script-able infrastructure pipelines.

Khalil BijjouWell, that escalated quickly! - a penetration tester's approach to privilege escalation

Kirill PuzankovMobile signaling threats and vulnerabilities - real cases and statistics from our experience

Konrad JędrzejczykWiFi practical hacking "Show me the passwords!"

Leo NeaguCatch Me If You Can - Finding APTs in your network

Maksim IavichLattice based Merkle for post-quantum epoch

Manuel WiesingerCPU vulnerabilities - where are we now?

Marek ZmysłowskiHow to Fuzz like a Hacker

Marius BucurIn search of unique behaviour

Mihai VasilescuFrom Mirai to Monero – One Year’s Worth of Honeypot Data

Mike SpicerYear of the #WiFiCactus

Mircea NenciuTrust, but verify – Bypassing MFA

Muhammad Mudassar YaminImplementation of information security techniques on modern android based Kiosk ATM/remittance machines

Mushegh HakhinianBuilding application security with 0 money down

Neil “Grifter” WylerThreat Hunting: From Platitudes to Practical Application

Octavian GuzuHacking at the ECSC
Radu-Emanuel ChiscariuDrupalgeddon 2 – Yet Another Weapon for the Attacker

Raluca StanciuEconomical Denial of Sustainability in the Cloud (EDOS)

Razvan BocuSecure and privacy-preserving data transmission and processing using homomorphic encryption

Razvan TodorBridging the gap between CyberSecurity R&D and UX

Stefan MitroiTrust, but verify – Bypassing MFA

Stefan TanaseInternet Balkanization: Why Are We Raising Borders Online?

Stefan ZarinschiThe Charter of Trust

Stephan GerlingRemote Yacht Hacking

Tiberiu BorosWeaponizing Neural Networks. In your browser!

Sponsors & Partners

They help us make this conference possible.

Stay Updated - Join Our Newsletter