InfoconDB
Toggle navigation
Support
About
InfoconDB
TROOPERS
TROOPERS16
TROOPERS16 (2016)
TROOPERS16
took place March 14, 2016 through March 17, 2016 (9 years ago) at an unknown location.
https://troopers.de/troopers16/
https://infocon.org/cons/TROOPERS/TROOPERS 2016/
Presentations
Wednesday, March 16, 2016
09:00 -
Opening Keynote
Keynote
10:30 -
Hiding your White-Box Designs is Not Enough
10:30 -
Patch me if you can
10:30 -
Mind The Gap - Exploit Free Whitelisting Evasion Tactics
11:30 -
Towards a LangSec-aware SDLC
11:30 -
Attacking Next-Generation Firewalls
11:30 -
Preventing vulnerabilities in HANA-based deployments
13:30 -
An easy way into your multi-million dollar SAP systems: An unknown default SAP account
13:30 -
Cloud Seeding or Finding weird machines in the cloud crowd sourced economy.
13:30 -
QNX: 99 Problems but a Microkernel ain't one!
14:30 -
Imma Chargin Mah Lazer - How to protect against (D)DoS attacks
14:30 -
unrubby: reversing without reversing
14:30 -
Thanks SAP for the vulnerabilities. Exploiting the unexploitable
16:00 -
I Have the Power(View): Offensive Active Directory with PowerShell
16:00 -
Deep-dive into SAP archive file formats
16:00 -
Learn about the enemy - How to profile national APT hacking group
17:00 -
Crypto code: the 9 circles of testing
17:00 -
One tool to rule them all - and what can it lead to
17:00 -
Reverse Engineering a Digital Two-Way Radio
17:15 -
Planes, Trains and Automobiles: The Internet of Deadly Things
17:30 -
Freifunk - Building a free and open network
17:30 -
Hollywood Hacking
17:30 -
Let's Play Hide and Seek In the Cloud - The APT Malware Favored in Cloud Services
17:45 -
The Chimaera Processor
Thursday, March 17, 2016
10:30 -
Real-life Software-Defined Security
10:30 -
Passive Intelligence Gathering and Analytics - It's all Just Metadata!
10:30 -
Broadcasting your attack: Security testing DAB radio in cars
11:30 -
THE KINGS IN YOUR CASTLE - All the lame threats that own you but will never make you famous
11:30 -
BetterCrypto: three years in
11:30 -
The road to secure Smart Cars: ENISA approach
13:30 -
Medical Device Security: Hack or Hype?
13:30 -
Attacking and Protecting Big Data Environments
13:30 -
Rapid Radio Reversing
14:30 -
How easy to grow robust botnet with low hanging fruits (IoT) - for free
14:30 -
How to Implement an SDL in a Large Company
14:30 -
The Joy of Sandbox Mitigations
16:00 -
Unpatchable Living with a vulnerable implanted device
16:00 -
Russian attack: Live demos of their steps, tools, techniques
16:00 -
Caring for file formats
17:00 -
Closing Remarks
Presenters
Aaron Zauner /
azet
Adrian Dabrowski /
atrox
Alex Plaskett
Alexander Polyakov
Andreas Wiegenstein
Andy Davis
Ange Albertini
Arne Lüdtke
Arrigo Triulzi
Ashley Shen
Attila Marosi
Ben Oswald
Ben Zevenbergen
Birk Kauer
Bryan K. Fite
Casey Smith
Christiane Ruetten
Christopher Truncer
Cédric Levy-Bencheton
Damian Poddebniak
Dmitry Chastuhin
Enno Rey
Felix Wilhelm
Georgi Geshev
Graeme Neilson
Ivan Pepelnjak
Jacob Torrey
James Forshaw
Jean-Philippe Aumasson
Jinwook Chung
Joris van de Vis
Juan Perez-Etchegoyen
Kevin Fu
Marie Moe
Marion Marschalek
Martin Gallo
Matthias Luft
Michael Ossmann
Moonbeom Park
Nahuel Sanchez
Olga Yanushkevich
Oliver Matula
Philippe Teuwen
Raphaël Vinot
Richo Healey
Sebastian Schinzel
Sun Huang
Travis Goodspeed
Vladimir Wolstencroft
Wayne Huang
Will Schroeder /
@harmj0y