Keynote | Do we get stuff done? We don’t get stuff done? Or do we? Or will we, maybe? Soon? by Dr.-Ing. Mario Heiderich |
|
|
0-Day Up Your Sleeve - Attacking macOS Environments by Wojciech Reguła |
|
|
A Kernel Hacker Meets Fuchsia OS by Alexander Popov |
|
|
A New Secret Stash For Fileless Malware by Denis Legezo |
|
|
A UEFI firmware bootkit in the wild by Ivan Kwiatkowski |
|
|
Automate Your Whatsapp Chats by Aditi Bhatnagar |
|
|
c0ntextomy - Let's Debug Together by Nikias Bassen |
|
|
CXO Panel | Cloud Services for Financial Inclusion: Possibilities & Challenges by Nandkumar Saravade IPS (Retd), Ganesh AR, Navin Kumar Singh & Himanshu Kumar Das |
|
|
CXO Panel | Consumer Tech Bug Bounty Panel: Hear from the Program Managers by Sandeep Singh, Rishika Hooda & Omar Benbouazza |
|
|
CXO Panel | Does your SOC sucks? by Krishna Pandey, Shweta Kshirsagar, Vivek Gopalan & Yogi Kapur |
|
|
CXO Panel | Impact of disruptive technologies on CISO's career & progression by Burgess Cooper, Sandeep Karan, Jacxine Fernandez, Kumar Ravi & Venkatesh Sundar |
|
|
CXO Panel | IoT Supply Chain Blues and the way forward by Aseem Jakhar, Sachin Jain, Kedar Sovani, Anantharaman Iyer, Suvabrata Sinha & Sudarshan Rajagopal |
|
|
CXO Panel | PAM Maturity : From Zero Trust to Least Privilege by Ajay Bongirwar, Charanjit Bhatia & Bala Ramanan |
|
|
CXO Panel | Secure Service Edge (SSE): Challenges and Upsides of Adoption by Rahul Neel Mani, Rajesh Hemrajani, Anuprita Daga & Shiju Rawther |
|
|
CXO Panel | Securing India the CERT-In Way by Saikat Datta, Dr. Sanjay Bahl, Ajit Menon & Anuprita Daga |
|
|
CXO Panel | Securing the Software by Matthew Bohne, Mrudul Uchil, Abhishek Datta & Harish Goel |
|
|
CXO Panel | Unlocking Security Collaboration with Cyber Threat Intelligence by Avkash Kathiriya, Amol Naik, Varun Singla & Mathan Babu Kasilingam |
|
|
Do PDF Tools Conform To The Specification? by Dr. Prashant Anantharaman |
|
|
ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface On Electron by Mohan Sri Rama Krishna Pedhapati & Maxwell Garrett |
|
|
Elevating The TrustZone To Achieve A Powerful Android Kernel Exploit by Tamir Zahavi-Brunner |
|
|
Hack The Bridge by Anto Joseph |
|
|
Hack the Source: Securing Open Source Software – One bug at a time by Sandeep Singh & Laurie Mercer |
|
|
Hacking Android Foreground Services Escalation Of Privileges by Rony Das |
|
|
Hacking Fintech Crime: Realities and Possibilities in India by Anand Venkatanaryanan & Mr Chander Mohan |
|
|
Hacking 5G Is No Rocket Science by Altaf Shaik & Matteo Strada |
|
|
Handling A Bug Bounty program From A Blue Team Perspective by Ashwath K & Ankit Anurag |
|
|
Honey, I Just Put The Hospital On A Ventilator! - DICOM And Its Pitfalls by Shyam Sundar Ramaswami & Rakesh Mahanthi |
|
|
Into The Dark - Switching Off Renewable Power From Everywhere by Stephan Gerling |
|
|
Jailbreaking iOS in the post-apocalyptic era by CoolStar & Tihmstar |
|
|
Mind The Gap - The Linux Ecosystem Kernel Patch Gap by Jakob Lell & Regina Bíró |
|
|
Pushing Security Left By Mutating Byte Code by Gaurav Gogia |
|
|
Raining CVEs On WordPress Plugins With Semgrep by Shreya Pohekar & Syed Sheeraz Ali |
|
|
Scale hacking to secure your cloud and beyond by Anand Prakash |
|
|
Service Workers VS Corporate Firewalls by Aleksandr Kolchanov |
|
|
Software-Defined Snort With Barnyard & Pulled Pork For NIDPS by Arun Samuel Baskaran |
|
|
The Different Faces Of macOS Malware: Detecting Anomalies In A Poisoned Apple by Amit Malik & Pratik Jeware |
|
|
Unearthing Malicious And Other “Risky” Open-Source Packages Using Packj by Ashish Bijlani & Devdutt Patnaik |
|
|
Vajra - Your Weapon To Cloud by Raunak Parmar |
|
|
vPrioritizer: Art of Risk Prioritization by Pramod Rana |
|
|
Web3.0 - Smart Contracts Could Be Leaky by Riddhi Shree |
|
|
ZaaS: [OWASP] ZAP As A Service - Continous Security For 20K+ AP by Varun Kakumani & Rohit Sehgal |
|
|
Workshop | Building Security Applications On Smart Cards by Dr. Rajesh Kumar Pal |
|
|
Workshop | Deep Dive: Red Team Test Operations by Elena Feldman, Vsevolod Kalshikov, Vadim Pleshkov & Veronika Matveeva |
|
|
Workshop | One SMALI Step For Man, One Giant Step For Researchers by Gabriel Cirlig |
|
|
Workshop | Peeling Back The Onion: Taking Security Onion Into Battle by Dr. James Stanger |
|
|
Workshop | Ticketing 101: Making Sure Your Documentation Is As Good As Your Findings by Documentation Is As Good As Your Findings by Paula Pustulka |
|
|