• Speakers
  • Resume Clinic
  • Sponsors
  • Training
  • Registration
  • -->

    Goa 2020


    Download Collection

    [KEYNOTE] The Metadata Trap: Whistleblowers in the Age of Surveillance and Big Data by Micah Lee

    Bug Bounty: Why is this happening? by Adam Ruddermann

    Automotive Security Bugs Explained for Bug Hunters by Jay Turla

    PwdLess: Exploitation Tales from RouterLand by Christofaro Mune

    Rage against the IDOR’s: Using Machine Learning models to detect and stop authorization bypass vulnerabilities by Juan Berner

    Don't Ruck Us Too Hard - Owning All of Ruckus AP devices by Gal Zror

    Mlw #41: a new sophisticated loader by APT group TA505 by Alexey Vishnyakov

    Taking the guess out of Glitching by Adam Laurie

    [Workshop] Learn by Doing - DevSecOps on AWS using Cloud-Native Services by Akash Mahajan & Sunesh Govindaraj

    Internet Goverance by Ihita Gangavarapu

    Data Sniffing over Air Gap by Avni Singh & Garima Maithani

    [Workshop] Hardware Hacking by Asmita Jha

    [Closing Note] Cybersecurity In India - Information Asymmetry, Cross Border Threats and National Sovereignty by Saumil Shah

    Hacker Q&A with Nathaniel Wakelam & Laurie Mercer

    [Workshop] When Sh*t’s on Fire by Valentine Mairet & Sebastiaan Groot

    Panel: Securing the Human Factor

    Panel: Predicting Danger: Building the Ideal Threat Intelligence Model

    Panel: Lessons from the Cyber Trenches

    Panel: Complication in Security Practices

    [KEYNOTE] Crouching hacker, killer robot? Removing fear from cyber-physical security by Stefano Zanero

    The One Weird Trick SecureROM Hates, vol. 2 by Nikias Bassen

    Putting it all together: building an iOS jailbreak from scratch by Umang Raghuvanshi

    XNU heap exploitation: From kernel bug to kernel control by Tihmstar

    Dissecting Rotten Apples – macOS Malware Analysis by Felix Seele

    InfoSec Deep Learning in Action by Satnam Singh

    Hacking Automatically: Applying Program Analysis to IoT by Ryan Speers

    COMpromise: remote code execution in Windows development environments by Stan Hegt

    Building advanced security applications on Qiling.io by Kaijern Lau & Quynh Nguyen Anh

    Cloud As an Attack vector by Rushikesh Vishwakarma & Ashwin Vamshi

    [Workshop] Out-of-Band Exploitation for Asynchronous Vulnerabilities by Ashwin Pathak & Ajay Prashar

    Automated Classification of Web-Application Attacks for Intrusion Detection by Aneet Kumar Dutta

    Panel: Supply Chain Security in Critical Infrastructure Systems

    Panel: Economics of Data Breach and Attack

    Panel: Hack the law : Protection for ethical cyber security research in India