Keynotes |
Rafal Wojtczuk |
Endpoint security via application sandboxing and virtualization past, present, future (pptx, 5.5 Mb) |
Gregor Kopf |
State of Crypto Affairs (tbz, 51.5 Mb) |
Talks |
Adrian Furtuna |
Practical exploitation of rounding vulnerabilities in internet banking applications (pdf, 1.8 Mb) |
Glenn Wilkinson |
The Machines that Betrayed their Masters (pdf, 24 Mb) |
Mario Heiderich |
JSMVCOMFG To sternly look at JavaScript MVC and Templating Frameworks |
Gal Diskin |
Virtually Impossible: The Reality Of Virtualization Security (pdf, 2.3 Mb) |
Peter Hlavaty |
DbiFuzz framework (zip, 80,3 Mb) |
Mateusz 'j00ru' Jurczyk |
Windows Kernel Trap Handler and NTVDM Vulnerabilities Case Study (pdf, 3.7 Mb) |
Meder Kydyraliev |
Mining Mach Services within OS X Sandbox (pdf, 0.8 Mb) |
Tomas Hlavacek |
IP fragmentation attack on DNS (pdf, 0.4 Mb) |
Alexander Bolshev Alexander Malinovsky |
HART (in)security (pdf, 2.5 Mb) |
Vadim Bardakov |
Exploitation of AVR & MSP microchips (pptx, 25.9 Mb) |
Ivan Novikov |
Filesystem timing attacks practice (pdf, 1.4 Mb) |
Anton Dorfman |
Reversing data formats: what data can reveal (ppsx, 0.5 Mb) |
Alexey Troshichev |
Strike to the infrastructure: a story about analyzing thousands mobile apps (pdf, 2.9 Mb) |
Alexander Timorin Alexander Tlyapov |
SCADA deep inside: protocols, security mechanisms, software architecture (pdf, 5.4 Mb) |
Alexander Lyamin |
Anatomy and metrology of DoS/DDoS (pptx, 12.7 Mb) |
Leonid Yuriev |
TOPGUN multi terabit DPI (pdf, 1 Mb) |
Vitaly Kamluk |
Ice fog |
Workshops |
Roman Korkikyan |
Timing analysis (zip, 15 Mb) |
Georgy Nosenko |
An introduction to the use SMT solvers for software security (ppt, 5.2 Mb) |
Dmitry 'D1g1' Evdokimov |
BlackBox analysis of iOS apps (pdf, 1.4 Mb) |
Aleksandr Matrosov Eugene Rodionov |
Advanced Threats Reverse Engineering |
Krzysztof Kotowicz |
Hacking HTML5 (pdf, 0.9 Mb) |
FastTrack |
Inbar Raz |
Physical (In)Security its not ALL about Cyber (pptx, 10.9 Mb) |
Viktor Alyushin |
Advanced exploitation of Android Master Key Vulnerability (bug 8219321) (zip, 4.1 Mb) |
Aleksandr Matrosov Eugene Rodionov |
HexRaysCodeXplorer: make object-oriented RE easier (pdf, 1.6 Mb) |
Vladimir Kropotov Vitaly Chetvertakov |
Practical application of math methods and image recognition in attack detection. With novel case studies :) (ppt, 1.6 Mb) |
Denis Makrushin |
Web under pressure: DDoS as a service (pptx, 2.2 Mb) |
Dmitry Boomov |
Hosting dashboard web application logic vulnerabilities (ppt, 4 Mb) |
Andrey Danaw |
Session management errors in cloud solutions and in classic hosting systems (pdf, 2.7 Mb) |
Anton Cherepanov |
Hesperbot: analysis of a new banking trojan (pdf, 2 Mb) |
Sergey Belov |
NGINX Warhead (pptx, 0.3 Mb) |
Anton Dedov |
Testing of password policy (pptx, 2.6 Mb) |
EAS-SEC |
Alexey Tyurin |
Accounting hacking arch bugs in MS Dynamics GP (pptx, 2.2 Mb) |
Alexey Tyurin |
HR Hacking bugs in PeopleSoft (pptx, 2.5 Mb) |
Gleb Cherbov |
DBO Hacking arch bugs in BSS (pptx, 1.5 Mb) |
Dmitry Chastukhin |
Business Intelligence hacking Breaking ICCube (pptx, 5.2 Mb) |
Alexander Polyakov |
EAS-SEC: business application security deployment guideline |
Evgeny Neyolov |
Dev system hacking arch bugs in SAP SDM (pptx, 1.1 Mb) |