• Speakers
  • Resume Clinic
  • Sponsors
  • Training
  • Registration
  • -->

    Goa 2017

    FROM THE ARCHIVES

    Download Collection

    Keynote - Joshua Pennell

    Antivirus Evasion Reconstructed - Veil 3.0 by Christopher Truncer

    Case Study on RFID (proximity cards) Hacking by Sarwar Jahan and Ashwath Kumar

    Explorer's Guide to Shooting Satellite Transponders by Jay Turla

    Injecting Security into Web apps with Runtime Patching and Context Learning by Ajin Abraham

    Invoke - Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To) D""e` Tec` T 'Th'+'em' by Daniel Bohannon

    The Mirai BotNet and where DDoS attacks are headed by Ben Herzberg

    Tale of training a Web Terminator! By Bharadwaj Machiraju

    The Art of Bootloader Unlocking: Exploiting Samsung Sboot by Nitay Artenstein

    Hacking medical devices and infrastructure by Anirudh Duggal

    Hypervisors in Your Toolbox: Monitoring and Controlling System Events with HyperPlatform by Satoshi Tanda and Timo Kreuzer

    p≡p ≡ pretty Easy privacy: making privacy the default for everyone by Sva

    Case study of SS7 / Sigtran assessment by Akib Sayyed

    Drone Hijacking and other IoT hacking with GNU Radio and SDR by Arthur Garipov

    Nearly generic fuzzing of XML - based formats by Nicolas Gregoire

    Blockchain and security: bank and insurance applications by Renaud Lifchitz

    7 sins of ATM protection against logical attacks by Timur Yunusov

    Rapid Security in the Cloud with AWS and CIS by Mikhail Advani & Rajesh Tamhane

    Rapid Security in the Cloud with AWS and CIS by Mikhail Advani & Rajesh Tamhane