TROOPERS23 - 35 talks
(WINDOWS) HELLO FROM THE OTHER SIDE
Dirk-jan Mollema
ALL YOUR PARCEL ARE BELONG TO US
Dennis Kniel
ATTACKING ULTRA-WIDEBAND: SECURITY ANALYSIS OF UWB APPLICATIONS IN SMARTPHONES
Jiska Classen Alexander Heinrich
BEYOND JAVA: OBFUSCATING ANDROID APPS WITH PURELY NATIVE CODE
Laurie Kirk
CAT & MOUSE - OR CHESS?
Fabian Mosch
DAS IT-SECURITY-LAGEBILD AUS HEISE-SICHT
Jürgen Schmidt aka ju
DETECTION AND BLOCKING WITH BPF VIA YAML
Kev Sheldrake
DUMPING NTHASHES FROM AZURE AD
Nestori Syynimaa
EVERYONE KNOWS SAP, EVERYONE USES SAP, EVERYONE USES RFC, NO ONE KNOWS RFC: FROM RFC TO RCE 16 YEARS LATER
Fabian Hagg
FACT BASED POST EXPLOITATION - OFFICE365 EDITION
Melvin Langvik
FAULT INJECTION ATTACKS ON SECURE AUTOMOTIVE BOOTLOADERS
Nils Weiss Enrico Pozzobon
FORENSIC EXAMINATION OF CEPH
Florian Bausch
FORENSIC ANALYSIS ON REAL INCIDENTS INSIDE MICROSOFT REMOTE DESKTOP SERVICES
Catarina de Faria Cristas
GPT-LIKE PRE-TRAINING ON UNLABELED SYSTEM LOGS FOR MALWARE DETECTION
Dmitrijs Trizna Luca Demetrio
HIDDEN PATHWAYS: EXPLORING THE ANATOMY OF ACL-BASED ACTIVE DIRECTORY ATTACKS AND BUILDING STRONG DEFENSES
Jonas Bülow Knudsen Alexander Schmitt
HOMOPHONIC COLLISIONS: HOLD ME CLOSER TONY DANZA
Justin Ibarra Reagan Short
HORROR STORIES FROM THE AUTOMOTIVE INDUSTRY
Thomas Sermpinis
INTERNAL SERVER ERROR: EXPLOITING INTER-PROCESS COMMUNICATION IN SAP’S HTTP SERVER
Martin Doyhenard
JUPYSEC: AUDITING JUPYTER TO IMPROVE AI SECURITY
Joe Lucas
MONITORING SOLUTIONS: ATTACKING IT INFRASTRUCTURE AT ITS CORE
Stefan Schiller
OAUTH AND PROOF OF POSSESSION - THE LONG WAY ROUND
Dominick Baier
OOPSSEC - THE BAD, THE WORST AND THE UGLY OF APT’S OPERATIONS SECURITY
Tomer Bar
PRIORITY FOR EFFECTIVE ACTION - A PRACTICAL MODEL FOR QUANTIFYING THE RISK OF ACTIVE DIRECTORY ATTACKS
Mars Cheng Dexter Chen
REAL WORLD DETECTION ENGINEERING IN A MULTI-CLOUD ENVIRONMENT
Aaron Jewitt
REPORTLY - KEEP YOUR HEAD IN THE CLOUDS. A NEW AZURE VISUALIZATION TOOL FOR ANALYZING USER ACTIVITIES.
Sapir Federovsky
SAP (ANTI-)FORENSICS: DETECTING WHITE-COLLAR CYBER-CRIME
Yvan Genuer
SECURITY HEROES VERSUS THE POWER OF PRIVACY
Avi D Kim Wuyts
SO YOU PERFORMED A FOREST RECOVERY. HOW DO YOU RECONNECT YOUR AD AGAIN WITH AZURE AD?
Jorge de Almeida Pinto
SPOOKY AUTHENTICATION AT A DISTANCE
Tamas Jos
STAY FIT: HACK A JUMP ROPE
Axelle Apvrille
TESTING AND FUZZING THE KUBERNETES ADMISSION CONFIGURATION
Benjamin Koltermann Maximilian Rademacher
THE ANATOMY OF WINDOWS TELEMETRY PART 2
Tillmann Oßwald Dominik Phillips Maximilian Winkler
THE POWER OF COERCION TECHNIQUES IN WINDOWS ENVIRONMENTS
Martin Grottenthaler
THE WIRE ON FIRE: THE SPIES WHO LOVED TELCOS
Aleksandar Milenkoski
VULNERABILITIES IN THE TPM 2.0 REFERENCE IMPLEMENTATION CODE
Francisco Falcon