PLANNING: talkS

FEATURED

FULL TIMELINE

+

Opening Keynote

talk
  • 24/06/17
    10:00 > 10:30
  • CONFERENCE AREA
  • FreeMan

15 years ! HZV will never die !

+

Bug Bounty Opening

talk
  • 24/06/17
    10:30 > 10:45
  • CONFERENCE AREA

Qwant.com is funding our Bug Bounty, we'll give you the rules.

+

(EN) Where Cypherpunk Meets Organized Crime:
The Shifting Landscape of Underground Economies and Crypto-driven Privacy

talk

It has been six years since the first Tor market opened shop. The period between then and now has been one marked by violent growth, innovation, and adaptation.
With more than thirty active darkweb markets and countless individual shops in operation...

+

(FR) Build your own low-cost FPGA password cracker on the blockchain for fun and profit!
with Renaud LIFCHITZ

talk

This innovative talk will mix DIY, emerging technologies and computer security. First part of the talk will explain how to build your own low-cost, powerful, totally silent and ecological password cracker using a cheap and publicly available FPGA boa...

+

(FR) Le combat numérique au cœur des opérations par Arnaud COUSTILLIERE

talk
  • 24/06/17
    12:15 > 13:00
  • CONFERENCE AREA
  • Arnaud COUSTILLIERE

Vice Admiral Arnaud Coustilliere was born in Toulon on the 3rd of November 1960. He has led a distinguished career as a surface warfare officer, commanding officer, and other appointments in the Navy and Joint Defence staff.

Specialised in the fiel...

+

(FR) Android Permission Assignation, from Packages to processus with Julien THOMAS

talk


Permission management control is becoming a primary concern due to the always growing privacy and data concerns, and even more specifically on mobile devices. With Marshmallow, and based on the AppOp project under KitKat, Android users now have (par...

+

(EN) When encryption is not enough: Attacking Wearable - Mobile communication over BLE with Eliza Chelleng & Sumanth Naropanth

talk

Communication protocols have evolved from the traditional Serial and LAN ports to complex and lightweight protocols of today, such as Bluetooth Low Energy (BLE), ANT+ and ZigBee. Bluetooth Low Energy (BLE) is a popular protocol of choice for wearable...

+

(FR) Make hardware great again ! with Virtualabs

talk

The hardware has changed, it has been closed, connected, unusable when the companies get bankrupted. This is a problem because those
connected objects such as watches, locks, alarms, drones... A real invasion.
It is time for us to take back the con...

+

(EN) THE NEW SHERIFF IN TOWN IS A MACHINE: THE PROBLEMS WITH USING AI, PREDICTIVE ANALYTICS, AND BIG DATA TO FIGHT CRIME AND FIND “TERRORISTS" WITH JENNIFER LYNCH

talk

In the last few years, law enforcement technologies have become “smarter” and cheaper. Now even small agencies can buy their own drones or collect face recognition images or DNA from anyone right out on the street. But as police technologies have...

+

(FR) NTFS, forensics, malwares and vulnerabilities with Stéfan LE BERRE (HEURS)

talk

Along this talk, we will talk about a well-known filesystem used by millions of people, the NTFS, which is used in every Windows machine.
In fact, only a few people know what you can really find in a NTFS filesystem, we will see how it works and how...

+

(EN) How to fool antivirus software?

talk
  • 24/06/17
    18:45 > 19:30
  • CONFERENCE AREA
  • Baptiste David

Remedial courses for CIA and other state agencies…

From recent times, more and more leaks inform us how national agencies work to bypass antivirus securities for surveillance activities. Press write about sophistication of attacks, tricks used,...

+

(FR) Windows 10 Pool Party

talk

For many years, Windows drivers have been a great attack vector in order to elevate privileges and acquire kernel execution.
And for many years, Microsoft has been working to mitigate those attacks, increasing the security for each version of Window...

+

(EN) How my SV Machine nailed your Malware with Nikhil KURKANI

talk

As we know the Android Application Industry from a security perspective, it is also quite well known that the Android platform is succeptible to malicious applications. And with the recent trend where all the vendors and customers going completely mo...

+

(FR) Hack your car or your helicopter !

talk workshop

The connected car is a subject often discussed in the media. The digital takeover of the vehicle is a nightmare for builders. Instead of opening and sharing common standards, we are able to reproduce the errors made in the past on the mechanical side...

GENERAL MAP