Buy a ticket


Ключевой доклад

Michael Ossmann Welcome to the Physical Layer

Основная программа

Alex Matrosov and Eugene Rodionov The UEFI Firmware Rootkits: Myths and Reality
Alex Matrosov and Ilia Safonov Excite project: all the truth about symbolic execution for BIOS security
Aleksandr Ermolov Safeguarding Rootkits: Intel BootGuard
Roman Bazhin and Maxim Malyutin JETPLOW is dead. Long live the JETPLOW!
Sen Nie and Ling Liu Gateway Internals of Tesla Motors
Nikita Abdullin Breaking Crypto for Dummies
Matthias Deeg and Gerhard Klostermeier Of Mice and Keyboards: On the Security of Modern Wireless Desktop Sets
Ivan Novikov Hacking ElasticSearch
Thomas DEBIZE and Mahdi BRAIK Hadoop safari – Hunting for vulnerabilities
Michael Stepankin Advanced Web Application Fuzzing
Jeffrey Tang and Alex Matrosov You’re off the hook: blinding security software
Enrique Nissim I know where your page lives: Derandomizing the latest Windows 10 Kernel
Yuri Drozdov and Ludmila Drozdova The approach to developing LPE exploits on Windows 10 with allowances to the latest security updates
Ali Abbasi and Majid Hashemi Defeating Pin Control in Programmable Logic Controllers
Rodrigo Rubira Branco and Rohit Mothe DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes
Patrick Wardle Poking on Macs Recovery OS and Local OS Update Process
Ayoub Elaassal CICS Breakdown: Hack your way to transaction city
Mariano Graziano Dissecting complex code-reuse attacks with ROPMEMU
Angel Villegas FIRST: Changing How You Reverse Engineer
Alexander Evstigneev and Dmitry Kuznetzov Cisco Smart Install. Pentester’s opportunities
Alexander Bolshev How to circumvent AD converter, part 3, or tools for attacking converting analog data to digital
Alexey Rossovsky Stories about hacking low-cost phones

Defensive Track

Teymur Kheirkhabarov and Sergey Soldatov A threat hunter himself
Igor Bulatenko Fear and rage of two-factor authentication
Evgeniy Sidorov and Eldar Zaitov How to manage digital apps signatures in a big company
Mikhail Sosonkin Automating iOS blackbox security scanning
Alexey Karyabkin and Pavel Grachev Monitoring and analysis of emails or a primitive tool to detect a cyber attack
Ekaterina Pukhareva and Alexander Leonov Enterprise Vulnerability Management
Natalia Kukanova and Igor Gotz 20% of investment and 80% of profit. How to implement security requirements and maintain internal freedom


Igor Kirillov HexRaysPyTools
Ksenia Gnitko Neurotechnology for Security
Andrey Kovalev You are not the same as…
Anton Lopanitzyn A blow under the belt. How to avoid WAF/IPS/DLP
Denis Kolegov F5 BIG-IP vulnerabilities: detection and remedying
Mikhail Egorov Entity provider selection confusion attacks in JAX-RS applications
Georgy Zaytzev Reversing golang
Or Safran and Omer Yair Diving into Malware’s Furtive Plumbing


Max Moroz Modern fuzzing of C/C++ Projects
Mikhail Yakshin Reverse engineering of binary data files using Kaitai Struct
Boris Savkov Searching for vulnerabilities in the Computer-Aided Process Control System (CAPCS) with blackbox analysis under tight deadlines