Goa 2020

FROM THE ARCHIVES

Download Collection

[KEYNOTE] The Metadata Trap: Whistleblowers in the Age of Surveillance and Big Data by Micah Lee

Bug Bounty: Why is this happening? by Adam Ruddermann

Automotive Security Bugs Explained for Bug Hunters by Jay Turla

PwdLess: Exploitation Tales from RouterLand by Christofaro Mune

Rage against the IDOR’s: Using Machine Learning models to detect and stop authorization bypass vulnerabilities by Juan Berner

Don't Ruck Us Too Hard - Owning All of Ruckus AP devices by Gal Zror

Mlw #41: a new sophisticated loader by APT group TA505 by Alexey Vishnyakov

Taking the guess out of Glitching by Adam Laurie

[Workshop] Learn by Doing - DevSecOps on AWS using Cloud-Native Services by Akash Mahajan & Sunesh Govindaraj

Internet Goverance by Ihita Gangavarapu

Data Sniffing over Air Gap by Avni Singh & Garima Maithani

[Workshop] Hardware Hacking by Asmita Jha

[Closing Note] Cybersecurity In India - Information Asymmetry, Cross Border Threats and National Sovereignty by Saumil Shah

Hacker Q&A with Nathaniel Wakelam & Laurie Mercer

[Workshop] When Sh*t’s on Fire by Valentine Mairet & Sebastiaan Groot

Panel: Securing the Human Factor

Panel: Predicting Danger: Building the Ideal Threat Intelligence Model

Panel: Lessons from the Cyber Trenches

Panel: Complication in Security Practices

[KEYNOTE] Crouching hacker, killer robot? Removing fear from cyber-physical security by Stefano Zanero

The One Weird Trick SecureROM Hates, vol. 2 by Nikias Bassen

Putting it all together: building an iOS jailbreak from scratch by Umang Raghuvanshi

XNU heap exploitation: From kernel bug to kernel control by Tihmstar

Dissecting Rotten Apples – macOS Malware Analysis by Felix Seele

InfoSec Deep Learning in Action by Satnam Singh

Hacking Automatically: Applying Program Analysis to IoT by Ryan Speers

COMpromise: remote code execution in Windows development environments by Stan Hegt

Building advanced security applications on Qiling.io by Kaijern Lau & Quynh Nguyen Anh

Cloud As an Attack vector by Rushikesh Vishwakarma & Ashwin Vamshi

[Workshop] Out-of-Band Exploitation for Asynchronous Vulnerabilities by Ashwin Pathak & Ajay Prashar

Automated Classification of Web-Application Attacks for Intrusion Detection by Aneet Kumar Dutta

Panel: Supply Chain Security in Critical Infrastructure Systems

Panel: Economics of Data Breach and Attack

Panel: Hack the law : Protection for ethical cyber security research in India