Vorträge
- IT-SECX-2019_Bieder-Rottermanner-Madelmayer_A-handshake-for-vulnerabilities.pdf
- IT-SECX-2019_Bogner-Florian_Wenn-Modellzüge-Amok-fahren.pdf
- IT-SECX-2019_De-Sutter-Bjorn_Stealthy-Integration-of-Software-Protection.pdf
- IT-SECX-2019_Donko-Huber-Markus_The-nuts-and-bolts-of-Security-Automation-at-Runtastic.pdf
- IT-SECX-2019_Fischer-Bernhard_The-State-of-OnionCat.pdf
- IT-SECX-2019_FREINGRUBER-René_You-think-your-internal-network-is-secure.pdf
- IT-SECX-2019_Heinzle-Kucera_ISMS-im-Kontext-OT-und-NISG.pdf
- IT-SECX-2019_Kortschak-Schenner_Warum-Notfallvorsorge-wertlos-ist.pdf
- IT-SECX-2019_Inführ-Alexander_Hunting-for-Remote-Code-Execution-in-your-LibreOffice-Suite.pdf
- IT-SECX-2019_KUGLER-BERNAUER_Vertrauen-ist-gut-Pentests-sind-besser-Sicherheitsprobleme-in-Active-Directory-Forests.pdf
- IT-SECX-2019_Mrskos-Daniel_Reversing-an-iOS-App.pdf
- IT-SECX-2019_Mueller-Bernhard_Smashing-Smart-Contracts.pdf
- IT-SECX-2019_Raberger-Lellek_Security-Safety-Challenges-im-sicherheitskritischen-Umfeld.pdf
- IT-SECX-2019_Schafferer-Michael_Nationale-Maßnahmen-zur-Absicherung-intelligenter-Messsysteme.pdf
- IT-SECX-2019_Schauman-Philipp_Algorithmenethik.pdf
- IT-SECX-2019_SOCHOR-Hannes_Code-Analyse-und-Grammar-based-Fuzzing_An-Unholy-Alliance.pdf
- IT-SECX-2019_Ullrich-Johanna_Monocultures-and-Diversity-in-IT.pdf
- IT-SECX-2019_WEBER-Thomas_Reverse-Engineering-Custom-ASICs-by-Exploiting-Potential-Supply-Chain-Leaks.pdf
- IT-SECX-2019_Weichselbaum-Lukas-Securing-Web-Apps-with-Modern-Platform-Features.pdf
- IT-SECX-2019_WIND-David_Take-All-my-Money-Advanced-Spear-Phishing-Attacks.pdf