IT-SECX

Hörsaal 1 (englisch)

RID Hijacking: Maintaining Access on Windows Machines
Sebastian Castro | CSL Labs, Kolumbien
How reversing the COMBUS protocol resulted in breaking security of a security system
Kirils Solovjovs, Lettland
Current State of Car Security
Martin Schmiedecker | Bosch Engineering
How to secure IoT on the wireless physical layer
Henri Ruotsalainen | FH St. Pölten
CPU vulnerabilities – where are we now?
Manuel Wiesinger | SBA Research
Blockchain: You’re Doing It Wrong
Nicholas Stifter | SBA Research
Forensic Challenges due to Encryption Mechanisms
Mikhail Arshinskiy | Deloitte