Rafal Wojtczuk “Endpoint security via application sandboxing and virtualization — past, present, future” (pptx, 5.5 Mb)
Gregor Kopf “State of Crypto Affairs” (tbz, 51.5 Mb)
Adrian Furtuna “Practical exploitation of rounding vulnerabilities in internet banking applications” (pdf, 1.8 Mb)
Glenn Wilkinson “The Machines that Betrayed their Masters” (pdf, 24 Mb)
Mario Heiderich “JSMVCOMFG — To sternly look at JavaScript MVC and Templating Frameworks”
Gal Diskin “Virtually Impossible: The Reality Of Virtualization Security” (pdf, 2.3 Mb)
Peter Hlavaty “DbiFuzz framework” (zip, 80,3 Mb)
Mateusz 'j00ru' Jurczyk “Windows Kernel Trap Handler and NTVDM Vulnerabilities — Case Study” (pdf, 3.7 Mb)
Meder Kydyraliev “Mining Mach Services within OS X Sandbox” (pdf, 0.8 Mb)
Tomas Hlavacek “IP fragmentation attack on DNS” (pdf, 0.4 Mb)
Alexander Bolshev
Alexander Malinovsky
“HART (in)security” (pdf, 2.5 Mb)
Vadim Bardakov “Exploitation of AVR & MSP microchips” (pptx, 25.9 Mb)
Ivan Novikov “Filesystem timing attacks practice” (pdf, 1.4 Mb)
Anton Dorfman “Reversing data formats: what data can reveal” (ppsx, 0.5 Mb)
Alexey Troshichev “Strike to the infrastructure: a story about analyzing thousands mobile apps” (pdf, 2.9 Mb)
Alexander Timorin
Alexander Tlyapov
“SCADA deep inside: protocols, security mechanisms, software architecture” (pdf, 5.4 Mb)
Alexander Lyamin “Anatomy and metrology of DoS/DDoS” (pptx, 12.7 Mb)
Leonid Yuriev “TOPGUN multi terabit DPI” (pdf, 1 Mb)
Vitaly Kamluk “Ice fog”
Roman Korkikyan “Timing analysis” (zip, 15 Mb)
Georgy Nosenko “An introduction to the use SMT solvers for software security” (ppt, 5.2 Mb)
Dmitry 'D1g1' Evdokimov “BlackBox analysis of iOS apps” (pdf, 1.4 Mb)
Aleksandr Matrosov
Eugene Rodionov
“Advanced Threats Reverse Engineering”
Krzysztof Kotowicz “Hacking HTML5” (pdf, 0.9 Mb)
Inbar Raz “Physical (In)Security — it’s not –ALL– about Cyber” (pptx, 10.9 Mb)
Viktor Alyushin “Advanced exploitation of Android Master Key Vulnerability (bug 8219321)” (zip, 4.1 Mb)
Aleksandr Matrosov
Eugene Rodionov
“HexRaysCodeXplorer: make object-oriented RE easier” (pdf, 1.6 Mb)
Vladimir Kropotov
Vitaly Chetvertakov
“Practical application of math methods and image recognition in attack detection. With novel case studies :)” (ppt, 1.6 Mb)
Denis Makrushin “Web under pressure: DDoS as a service” (pptx, 2.2 Mb)
Dmitry Boomov “Hosting dashboard web application logic vulnerabilities” (ppt, 4 Mb)
Andrey Danaw “Session management errors in cloud solutions and in classic hosting systems” (pdf, 2.7 Mb)
Anton Cherepanov “Hesperbot: analysis of a new banking trojan” (pdf, 2 Mb)
Sergey Belov “NGINX Warhead” (pptx, 0.3 Mb)
Anton Dedov “Testing of password policy” (pptx, 2.6 Mb)
Alexey Tyurin “Accounting hacking — arch bugs in MS Dynamics GP” (pptx, 2.2 Mb)
Alexey Tyurin “HR Hacking — bugs in PeopleSoft” (pptx, 2.5 Mb)
Gleb Cherbov “DBO Hacking — arch bugs in BSS” (pptx, 1.5 Mb)
Dmitry Chastukhin “Business Intelligence hacking – Breaking ICCube” (pptx, 5.2 Mb)
Alexander Polyakov “EAS-SEC: business application security deployment guideline”
Evgeny Neyolov “Dev system hacking — arch bugs in SAP SDM” (pptx, 1.1 Mb)
Official support:
With participation of:
Gold sponsor:
Silvers sponsor:
Official beverage:
General Media Partner:
Gold Media Partner:
Media Partners:
Information Partners: