scrt.insomnihack
Your Identity Is Mine: Techniques And Insights From OS Identity Providers Research - Maor Abutbul
Advanced Android Archaeology: Baffled By Bloated Complexity - Mathias Payer
Beyond LSASS: Cutting-Edge Techniques For Undetectable Threat Emulation - Priyank Nigam
Demystifying Automated City Shuttles: Blessing Or Cybersecurity Nightmare? - Anastasija Collen
Pioneering Zero Days At Pwn2Own Automotive 2024 - Alex Plaskett & McCaulay Hudson
Introduction - Raphaël Conz
The AI Paradox: Safety Vs Performance - Rachid Guerraoui
What If I Told You That Security Is Here To Help? - Sebastian Avarvarei
Next-Gen Hiring Meets AI, Cybersecurity, And Inclusion - Panel Discussion
Cyber Innovation - Laurent Balmelli & Hugo Flayac & Aziz Belkhiria & Olivier Crochat & Lennig Pedron
20 Years Of Cybersecurity Automation: Has AI Restored Balance To The Force? - Raphaël Marichez
Stop Making Nonsense: Cutting Through Compliance Complexity - Mat Caplan
The Spy Who Flashed Me: Exploring And Defeating Physical Access Control Systems - Michael Rodger
Cache Me If You Can: Smuggling Payloads Via Browser Caching Systems - Aurélien Chalot
Malware Analysis With R2AI - Axelle Apvrille
Improving Your Hunting And Detection In Entra ID And O365 - John Stoner
Beyond The Surface: Exploring Attacker Persistence Strategies In Kubernetes - Rory McCune
The Rise Of AI-Driven Malware: Threats, Myths, And Defenses - Candid Wuest
Good Models Gone Bad: Visualizing Data Poisoning - Maria Khodak
"A Slice Of" Modern Program Analysis - Kyle Martin
Hacking Into Fedora And OpenSUSE - Thomas Chauchefoin & Maxime Rinaudo
Go Parser Footguns - Vasco Franco
An Uninvited House Guest: How PROXYLIB Overstayed Its Welcome On Android Devices - Lindsay Kaye
Operation Triangulation: Attacks On IPhones/iPads - Marco Preuss
Don’t Flatten Yourself: Restoring Malware With Control-Flow Flattening Obfuscation - Geri Revay
Diving Into JumpServer: The Public Key Unlocking Your Whole Network - Oskar Zeino-Mahmalat
ADDS Persistance - Burn It, Burn It All - Charlie "Shutdown" Bromberg & Volker
When Malware Becomes Creative: A Survey Of Android Detection Evasion Tactics - Dimitrios Valsamaras
Standing On The Shoulders Of Giant(Dog)s: A Kubernetes Attack Graph Model - Julien Terriac
Abusing Misconfigured OIDC Authentication In Cloud Environments - Christophe Tafani-Dereeper