International Speakers - Simultaneous translation

SOCIAL

Google Groups
Email:
Visit this group

TRAININGS

CONFIRMED SPEAKERS

 

Malware Tricks & Anti Forensics methods
Internet's Fallen Heroes
DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes
LangSec: From Theory to Practice
The Computer Forensics Process for Cybercrime Investigation: Methodologies, Techniques and Tools
Android Resiliency Defense Strategy
Protecting Linux against ring3 rootkits
A interseccao entre seguranca e virtualizacao: uma visao holistica
Voting Among Sharks
Witchcraft Compiler Collection : towards self aware computer programs
Lost your secure HDD PIN? We can help!
Rogue Behavior Detection: Tackling binaries while they are on the ground
UEFI Firmware Rootkits: Myths and Reality
HTTP2 Overview: A journey by RFC
Functional Programming Without a Functional Language
Information Security Community
Keynote Reflections on vulnerability research; is the only winning move not to play?
Enviando phishing como arte
R3MF: R3v3rs1ng on MachO File
EventID Field Hunter: Looking for malicious activities in your Windows events
Dumpster Driving 16: LTE4G Basestations
Keynote Is your memory protected? Attacks on encrypted memory and constructions for memory protection
Breaking the bank: practical Android reverse engineering
Risk based secure design of automotive networks

 

 


The use of "hacker" to mean "security breaker" is a confusion on the part of the mass media. We hackers refuse to recognize that meaning, and continue using the word to mean, "Someone who loves to program and enjoys being clever about it".

Richard Stallman

 

 

 ORGANIZATION

 

 

 PLATINUM SPONSORS

 

 

 GOLD SPONSORS

 

 

 SILVER SPONSORS

 

 

 

 BRONZE SPONSORS

 

 

 HACKING

 

 

 SUPPORTING ORGANIZATIONS