The DeepSec IDSC is an annual European two-day in-depth conference on computer, network, and application security. DeepSec IDSC 2014 will be held from November 18th to 21th 2014 at the Imperial Riding School Vienna, and aims to bring together the leading security experts from all over the world.
Days until the next conference
The Imperial Riding School Vienna – A Renaissance Hotel
The Imperial Riding School Vienna - A Renaissance Hotel
03-11-2014 | Die Highlights des Programms thematisieren Hintertüren in Serverhardware, Schwachstellen in kryptographischen Anwendungen, Schwächen im Internetprotokoll der nächsten Generation (IPv6), Aufspüren von Schadsoftware und neue Wege vernetzte Systeme zu kompromittieren. Read more
'Conferences are not intended to create bad memories, only good ones' DeepSec organizer René Pfeiffer
01-10-2014 | DeepSec is the second hacker conference to adopt a public, enforceable anti-harassment policy in response to the Ada Initiative’s article about pervasive harassment of women at several hacker conferences.
We interviewed René Pfeiffer, one of the organizers of DeepSec about the conference, why they adopted a policy, and what they are looking forward to at future DeepSec conferences. Read more
I will discuss specific design flaws in the security of “secure” Applications that promise to keep your data / password safe and sound should the device fall into the wrong hands.
Vladimir Katalov Vladimir Katalov presents the results of analysing the Apple iCloud protocol and its impact on iCloud services.
This presentation describes the technologies behind advanced static and dynamic vulnerability analysis tools. We conclude with a discussion of new ways to ensure that bugs get fixed before it’s too late.
The talk discusses a GSM debugging tool that consists entirely of open source software and open radio hardware. We will demonstrate how to record and decode GSM calls, even encrypted ones.
This talk is about the project to build the next generation IDS engine. The engine has been released under the name Suricata and can be downloaded from the Open Information Security Foundation (OISF) web site.
This talk introduces Trabbler, the first highly versatile “cross site scripting Trojan”. In the talk, we will discuss Trabbler ́s architecture and code and give practical examples of its application.
The details of reversing software running on Android is a scarce. This talk will explore the filesystem, memory, and reverse engineering techniques in-depth.
The presenters showed that Bluetooth is alive and kicking, exploit-wise. A new tool called Bluedriving is presented to capture and store the position and information of bluetooth devices.