• Archives
  • NULLCON Goa 2020

NULLCON Goa 2020

Conference Day 1: 6th March 2020

Talk Title and Speaker Videos Presentations
[KEYNOTE] The Metadata Trap: Whistleblowers in the Age of Surveillance and Big Data by Micah Lee
Bug Bounty: Why is this happening? by Adam Ruddermann
Automotive Security Bugs Explained for Bug Hunters by Jay Turla
PwdLess: Exploitation Tales from RouterLand by Christofaro Mune
Rage against the IDOR’s: Using Machine Learning models to detect and stop authorization bypass vulnerabilities by Juan Berner
Don't Ruck Us Too Hard - Owning All of Ruckus AP devices by Gal Zror
Mlw #41: a new sophisticated loader by APT group TA505 by Alexey Vishnyakov
Taking the guess out of Glitching by Adam Laurie
[Workshop] Learn by Doing - DevSecOps on AWS using Cloud-Native Services by Akash Mahajan & Sunesh Govindaraj
Internet Goverance by Ihita Gangavarapu
Data Sniffing over Air Gap by Avni Singh & Garima Maithani
[Workshop] Hardware Hacking by Asmita Jha
[Closing Note] Cybersecurity In India - Information Asymmetry, Cross Border Threats and National Sovereignty by Saumil Shah
Hacker Q&A with Nathaniel Wakelam & Laurie Mercer
[Workshop] When Sh*t’s on Fire by Valentine Mairet & Sebastiaan Groot
Panel: Securing the Human Factor
Panel: Predicting Danger: Building the Ideal Threat Intelligence Model
Panel: Lessons from the Cyber Trenches
Panel: Complication in Security Practices

Conference Day 2: 7th March 2020

Talk Title and Speaker Videos Presentations
[KEYNOTE] Crouching hacker, killer robot? Removing fear from cyber-physical security by Stefano Zanero
The One Weird Trick SecureROM Hates, vol. 2 by Nikias Bassen
Putting it all together: building an iOS jailbreak from scratch by Umang Raghuvanshi
XNU heap exploitation: From kernel bug to kernel control by Tihmstar
Dissecting Rotten Apples – macOS Malware Analysis by Felix Seele
InfoSec Deep Learning in Action by Satnam Singh
Hacking Automatically: Applying Program Analysis to IoT by Ryan Speers
COMpromise: remote code execution in Windows development environments by Stan Hegt
Building advanced security applications on Qiling.io by Kaijern Lau & Quynh Nguyen Anh
Cloud As an Attack vector by Rushikesh Vishwakarma & Ashwin Vamshi
[Workshop] Out-of-Band Exploitation for Asynchronous Vulnerabilities by Ashwin Pathak & Ajay Prashar
Automated Classification of Web-Application Attacks for Intrusion Detection by Aneet Kumar Dutta
Panel: Supply Chain Security in Critical Infrastructure Systems
Panel: Economics of Data Breach and Attack
Panel: Hack the law : Protection for ethical cyber security research in India

Copyright © 2023 | Nullcon India | International Security Conference | All Rights Reserved