• Archives
  • nullcon Goa'15

NULLCON GOA'15

THE SECURITY EVENT OF 2015

Presentations

Talk Title, Speaker Videos Presentations
Inaugural Note by Shri Janardhana Swamy  
Cyber Space by K D Nayak  
DNS vs.SECURITY by Dr. Paul Vixie  
Bounties & The Security Development Lifecycle - by Katie Moussouris  
ECMA Script 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes, and everything else - by Mario Heiderich
Drone Attacks: How I hijacked a drone - by Rahul Sasi
ICS/SCADA SECURITY - ANALYSIS OF A BECKHOFF CX5020 PLC - by Hans Hoefken
The NSA Playset: RF Retroreflectors - by Michael Ossmann
Mobile self-defence - by Karsten Nohl
The Windows Sandbox Paradox - by James Forshaw
Attack and Defence in Radio and Communication Warfare - by Akib Sayyad  
Analyzing Chrome crash reports at scale - by Abhishek Arya
Generic Executable Unpacking using Dynamic Binary Instrumentation - by Shubham Bansal  
Hacking Tizen: The OS of Everything - by Ajin Abraham
Building custom scans for real world enterprise network - by Sanoop Thomas  
Hunting and Decrypting Ghost communications using Memory Forensics - by Monnappa K.A  
When the Sky is Falling: High-Volume Reflection/Amplification Attacks - by Manish Sinha  
Parkomagic: a few words about the security of parking terminals - by Denis Makrushin  
Pentesting a website with million lines of Javascript - by Lavakumar & Nafeez  
Warning Ahead: Security Storms are Brewing in Your JavaScript - by Yuval Idan  
Anatomy of a credit card stealing POS malware - by Amol Sarwate
Cold Boot Attack on DDR2 and DDR3 RAM - by Marko Schuba

Copyright © 2017-18 | Nullcon India | International Security Conference | All Rights Reserved