Gabriel Cirlig

Senior Software Engineer Ixia, a Keysight business

BIOGRAPHY

Software developer turned rogue, went from developing apps for small businesses to 2M+ DAU Facebook games while keeping an eye for everything shiny and new. For about two years he’s been tinkering at Ixia’s threat intelligence system as his full time passion while playing around with whatever random hardware comes into his hands. With a background in electronics engineering and various programming languages, Gabriel likes to dismantle and hopefully put back whatever he gets his hands on.

Drive safely on the internet lane: how smart cars can leak your data

As “smart” is becoming the new standard for everything, malicious threat actors are quick to capitalize on the insecurity of IoT devices. Hackers getting into your computer and spying on you is not something new for the average internet user, but definitely an emerging threat in the world of cars. Given a relatively new car (2014) with an infotainment system completely decoupled from the car’s backbone (ignition, lights and such), we discovered sensitive personal information being stored completely in the clear. We were able to extract the call logs, text messages and phone agenda from all the connected mobile devices. More worryingly, the navigation system logs were left without any obfuscation, enabling a malicious attacker to track the position of the car in real time, when it’s near open wifi networks.
Presentation’s Co-Presenter is Stefan Tanase, Principal Security Researcher at Ixia, a Keysight business.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Bogdan Simion

Information Security Analyst Adobe

Daniel Tomescu

Security Penetration Tester KPMG Romania

Alexandru Ariciu

Penetration Tester and Vulnerability Researcher Applied Risk

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

As an infrastructure operator, technology integrator and IT&C services provider, Orange Business Services supports businesses and public entities in their digital transformation. Collect, transport, protect, store and process and analyze: they orchestrate every phase of the data journey, for your business to create even more value.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNERS
VIP & SPEAKER LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS