DeepSec

The DeepSec IDSC is an annual European two-day in-depth conference on computer, network, and application security. DeepSec IDSC 2014 will be held from November 18th to 21th 2014 at the Imperial Riding School Vienna, and aims to bring together the leading security experts from all over the world.

p

Conference information

Days until the next conference

Day(s)

:

Hour(s)

:

Minute(s)

:

Second(s)

Location

The Imperial Riding School Vienna – A Renaissance Hotel
Ungargasse 60
Vienna 1030
Austria

Conference program

The conference program can be viewed here.

News

  • 12-11-2014 | DeepSec 2014 Talk: The IPv6 Snort Plugin – Read more
  • 29-10-2014 | DeepSec 2014 Talk: Build Yourself a Risk Assessment Tool – Read more
  • 28-10-2014 | DeepSec 2014 Talk: Cloud-based Data Validation Patterns… We need a new Approach! – Read more

The Imperial Riding School Vienna - A Renaissance Hotel

Articles

Sicherheitskonferenz DeepSec legt Fokus auf Kommunikation und Wissen

03-11-2014 | Die Highlights des Programms thematisieren Hintertüren in Serverhardware, Schwachstellen in kryptographischen Anwendungen, Schwächen im Internetprotokoll der nächsten Generation (IPv6), Aufspüren von Schadsoftware und neue Wege vernetzte Systeme zu kompromittieren. Read more

'Conferences are not intended to create bad memories, only good ones' DeepSec organizer René Pfeiffer

01-10-2014 | DeepSec is the second hacker conference to adopt a public, enforceable anti-harassment policy in response to the Ada Initiative’s article about pervasive harassment of women at several hacker conferences.

We interviewed René Pfeiffer, one of the organizers of DeepSec about the conference, why they adopted a policy, and what they are looking forward to at future DeepSec conferences. Read more

Available videos

DeepSec 2013: Mobile Fail: Cracking open “secure” Android containers

DeepSec 2013: Mobile Fail: Cracking open “secure” Android containers

I will discuss specific design flaws in the security of “secure” Applications that promise to keep your data / password safe and sound should the device fall into the wrong hands.

DeepSec 2013: Cracking and analysing Apple iCloud protocols

DeepSec 2013: Cracking and analysing Apple iCloud protocols

Vladimir Katalov Vladimir Katalov presents the results of analysing the Apple iCloud protocol and its impact on iCloud services.

DeepSec 2010: Circumventing common Pitfalls when auditing sourcecode for security vulnerabilities

DeepSec 2010: Circumventing common Pitfalls when auditing sourcecode for security vulnerabilities

This presentation describes the technologies behind advanced static and dynamic vulnerability analysis tools. We conclude with a discussion of new ways to ensure that bugs get fixed before it’s too late.

DeepSec 2010: Debugging GSM

DeepSec 2010: Debugging GSM

The talk discusses a GSM debugging tool that consists entirely of open source software and open radio hardware. We will demonstrate how to record and decode GSM calls, even encrypted ones.

DeepSec 2009: Building the next generation IDS engine

DeepSec 2009: Building the next generation IDS engine

This talk is about the project to build the next generation IDS engine. The engine has been released under the name Suricata and can be downloaded from the Open Information Security Foundation (OISF) web site.

DeepSec 2007: Browser hijacking

DeepSec 2007: Browser hijacking

This talk introduces Trabbler, the first highly versatile “cross site scripting Trojan”. In the talk, we will discuss Trabbler ́s architecture and code and give practical examples of its application.

DeepSec 2010: Android reverse engineering and forensics

DeepSec 2010: Android reverse engineering and forensics

The details of reversing software running on Android is a scarce. This talk will explore the filesystem, memory, and reverse engineering techniques in-depth.

DeepSec 2013: Uncovering your trails

DeepSec 2013: Uncovering your trails

The presenters showed that Bluetooth is alive and kicking, exploit-wise. A new tool called Bluedriving is presented to capture and store the position and information of bluetooth devices.

Tweets