Hörsaal 1 (englisch) RID Hijacking: Maintaining Access on Windows Machines Sebastian Castro | CSL Labs, Kolumbien How reversing the COMBUS protocol resulted in breaking security of a security system Kirils Solovjovs, Lettland Current State of Car Security Martin Schmiedecker | Bosch Engineering How to secure IoT on the wireless physical layer Henri Ruotsalainen | FH St. Pölten CPU vulnerabilities – where are we now? Manuel Wiesinger | SBA Research Blockchain: You’re Doing It Wrong Nicholas Stifter | SBA Research Forensic Challenges due to Encryption Mechanisms Mikhail Arshinskiy | Deloitte