Vom 14. bis 17. Novem­ber 2017 find­et die DEEPSEC wieder im Impe­r­i­al Rid­ing School Hotel in Wien statt. Das Event gliedert sich an den ersten bei­den Tagen (14. und 15. Novem­ber) in einen Train­ing­steil und von 16. bis 17. Novem­ber in die hochw­er­tige DEEPSEC Kon­ferenz. Link zur Event­seite.

Als Anreiz für Ihren Besuch bietet SEC4YOU einen Rabattcode über 15% gültig für alle neuen Buchun­gen an. Nutzen Sie das Kon­tak­t­for­mu­lar unten, um Ihren Rabattcode anzu­fordern:

  • DEEPSEC Rabattcode anfordern

Auszug aus der Agenda

  • Social Sci­ence First! — Dr. Jes­si­ca Bark­er (Co-Founder, Redact­ed Firm)
  • Don’t Let The Cute­ness Fool You — Exploit­ing IoT’s MQTT Pro­to­col — dal­moz (Moshe Zioni) (VERINT)
  • Next-Gen Mirai — Balthasar Mar­tin & Fabi­an Bräun­lein (SRlabs)
  • Pay­ing the Price for Dis­rup­tion: How a Fin­Tech Allowed Account Takeover — Vin­cent Hau­pert, Tilo Müller, and Dominik Maier (Tech­ni­cal Uni­ver­si­ty of Berlin, Friedrich-Alexan­der Uni­ver­si­ty Erlan­gen-Nürn­berg)
  • Lessons Learned: How To (Not) Design Your Own Pro­to­col — Nico­lai Davids­son (zyan­tif­ic)
  • XFLTReaT: A New Dimen­sion In Tun­nelling — Bal­azs Buc­say (NCC Group)
  • A Sur­vey On Auto­mat­ed Dynam­ic Mal­ware Analy­sis Eva­sion and Counter-Eva­sion: PC, Mobile, and Web — Alex­ei Bulazel & Bulent Yen­er (Riv­er Loop Secu­ri­ty, LLC, Rens­se­laer Poly­tech­nic Insti­tute)
  • Lock, Stock And Two Smok­ing Apples — XNU Ker­nel Secu­ri­ty — Alex Plas­kett & James Loureiro (MWR InfoS­e­cu­ri­ty)
  • Behav­ior Based Secure And Resilient Sys­tem Devel­op­ment — Dr. Muham­mad Taimoor Khan (Alpen-Adria Uni­ver­si­ty, Kla­gen­furt, Aus­tria)
  • Wiedergänger: Exploit­ing Unbound­ed Array Access Vul­ner­a­bil­i­ties on Lin­ux — Julian Kirsch, Bruno Bier­baumer, Thomas Kit­tel, Clau­dia Eck­ert (Tech­ni­cal Uni­ver­si­ty of Munich)
  • How My SVM Nailed Your Mal­ware — Nikhil P. Kulka­rni (Inde­pen­dent Secu­ri­ty Researcher)
  • Beyond The Spear — What Can Orga­ni­za­tions Do To Deal With Spear Phish­ing — John­ny Deutsch (EY USA)
  • Who Hid My Desk­top – Deep Dive Into hVNC — Or Safran & Pavel Asi­novsky (IBM Secu­ri­ty Trusteer)
  • Inse­cu­ri­ty In Infor­ma­tion Tech­nol­o­gy — Tanya Jan­ca (Cana­di­an Gov­ern­ment)
  • How To Hide Your Brows­er 0‑days: Free Offense And Defense Tips Includ­ed — Zoltan Bal­azs (MRG Effi­tas)
  • Repair­ing The inter­net With Respon­si­ble Dis­clo­sures — Vic­tor Gev­ers (0xDUDE) (GDI.foundatoin)
  • Mal­ware Analy­sis: A Machine Learn­ing Approach — Chi­heb Cheb­bi (TEK-UP Uni­ver­si­ty)
  • Peo­ple­Soft: Hack The Planet’s Uni­ver­si­ties — Dmit­ry Yudin (https://erpscan.com)
  • Skip Trac­ing For Fun And Prof­it — Rhett Green­hagen (McAfee)
  • Effec­tive Secu­ri­ty Risk Mit­i­ga­tion Strat­e­gy For Coun­ter­ing Ter­rror­ism — A Case Study On Pak­istan — Cap­tain Kaleem Ahmad ® (Pak Arab Refin­ery Lim­it­ed)
  • Uncov­er­ing And Visu­al­iz­ing Bot­net Infra­struc­ture And Behav­ior — Josh Pyorre & Andrea Scar­fo (OpenDNS/Cisco)
  • Intel AMT: Using & Abus­ing The Ghost In The Machine — Parth Shuk­la (Google)
  • Nor­mal Per­mis­sions In Android: An Audio­vi­su­al Decep­tion — Con­stan­ti­nos Pat­sakis (Uni­ver­si­ty of Piraeus)
  • Hack­ing The Brain For Fun And Prof­it — Ste­fan Hager (DATEV eG)
  • Out-of-Order Exe­cu­tion as a Cross-VM Side Chan­nel and Oth­er Appli­ca­tions — Sophia d’Antoine, Jere­my Black­thorne, Bülent Yen­er (Trail of Bits, Rens­se­laer Poly­tech­nic Insti­tute)
  • Foren­sic Account­ing – The What, Why And How — Ulrike Hugl (Uni­ver­si­ty of Inns­bruck)
  • Mak­ing Secu­ri­ty Aware­ness Mea­sur­able — Ste­fan Schu­mach­er (Magde­burg­er Insti­tut für Sicher­heits­forschung)
  • On The (In-)Security Of JavaScript Object Sign­ing and Encryp­tion — Den­nis Deter­ing, Juraj Somorovsky, Chris­t­ian Main­ka, Vladislav Mlade­n­ov, Jörg Schwenk (Horst Görtz Insti­tute for IT Secu­ri­ty, Chair for Net­work and Data Secu­ri­ty, Ruhr-Uni­ver­si­ty Bochum)
  • I Wrote my Own Ran­somware; Did Not Make 1 Iota Of A Bit­coin — Thomas Fis­ch­er (Dig­i­tal Guardian)
  • Cloud Of Sus­pi­cion: Scal­ing Up Phish­ing Cam­paigns Using Google Apps Scripts — Maor Bin (Proof­point)
  • Enhanc­ing Con­trol Flow Graph Based Bina­ry Func­tion Iden­ti­fi­ca­tion — Clemens Jonis­chkeit, Julian Kirsch (Tech­ni­cal Uni­ver­si­ty of Munich)
  • BITSIn­ject — Con­trol Your BITS, Get SYSTEM — Dor Azouri (Secu­ri­ty researcher @SafeBreach)
  • How Secure Are Your VoLTE And VoW­iFi Calls? — Sreep­riya Cha­lakkal (ERNW GmbH)
  • Essen­tial Infra­struc­ture Inter­de­pen­den­cies: Would We Be Pre­pared For Sig­nif­i­cant Inter­rup­tions? — Her­bert Saurugg (Cyber Secu­ri­ty Aus­tria)
  • Bit­Crack­er: Bit­Lock­er Meets GPUs — Ele­na Agos­ti­ni (Nation­al Research Coun­cil of Italy)
  • Bypass­ing Web Appli­ca­tion Fire­walls — Khalil Bijjou (EUROSEC GmbH)
  • OpenDXL In Active Response Sce­nar­ios — Tar­mo Ran­del (CCDCOE)
  • How I Rob Banks — Freaky­clown (Redact­ed Firm)
  • Secur­ing The Dark­net — Jens Kubieziel (TorServers.net)
    A sto­ry of a vul­ner­a­bil­i­ty: How to exe­cute code on a foren­sic work­sta­tion — Wolf­gang Ettlinger (SEC Con­sult)
  • Build­ing Secu­ri­ty Teams — Astera Schneeweisz (Sound­Cloud)