Information Security Conference

Responsive image

Shedule

The program of the conference is supplemented, follow the update in Telegram.


Greetings of conference guests

Roman Romanov, Luka Safonov, Pentestit

The implementation of the GSM protocol stack based on OsmocomBB

Anton Gorbachev, Pentestit

Using the radare2 framework in reverse engineering to analyze binary files

Dmitry Lobzin, Pentestit

Detection of vulnerabilities in car alarms

Nikolay Krivosheya, NPO "ECHELON"

Identification of the user on the Internet based on HTTP cookies

Security Expert

Symbolic code execution techniques for analyzе of executable modules

Security Expert

Automation of OSINT

Alexey Vosyadov, Pentestit

Vulnerabilities of IoT/embedded devices

Luka Safonov, Pentestit

Static analysis of Dalvik bytecode

Eugene Minibaev, Innopolis University

Meta-polymorphic-evasive shellcodes and MorphEUS utility

Maksim Zaytsev, ENKI (France)

Presentation of Burp Suite plug-in from Vulners for vulnerability detection

Kirill Ermakov, QIWI

Forensic analysis OS Windows

Security Expert

Topological variants of WAF implementation

Andrey Dugin, MTS

Heuristic algorithms for detecting malicious code

Security Expert

Distributed systems for detecting computer attacks

Security Expert

Features of the development of incident management systems

Security Expert

FailOpen: how WAF becomes useless with protection of modern web applications

Andrey Petukhov, SolidLab

Hall | Subject Speaker Time
Hall 1Greeting Romanov R., Safonov L. 10:00
Hall 1The implementation of the GSM protocol stack based on OsmocomBB Gorbachev A., Pentestit 10:30
Hall 1Using the radare2 framework in reverse engineering to analyze binary files Lobzin D., Pentestit 11:30
break   12:30
Hall 1Detection of vulnerabilities in car alarms Krivosheya N., NPO "ECHELON" 13:30
Hall 1Identification of the user on the Internet based on HTTP cookies Security expert 14:30
Hall 1Symbolic code execution techniques for analyzе of executable modules Security expert 15:00
Hall 1Automation of OSINT Vosyadov A., Pentestit 15:45
Hall 1Vulnerabilities of IoT/embedded devices Safonov L., Pentestit 16:30
Hall 1Static analysis of Dalvik bytecode Minibaev E., Innopolis University 17:30
     
Hall 2MorphAES: Meta-polymorphic-evasive shellcodes Zaytsev M., ENKI (France) 10:30
Hall 2Presentation of Burp Suite plug-in from Vulners for vulnerability detection Ermakov K., QIWI 11:30
break   12:30
Hall 2Forensic analysis OS Windows Security expert 13:30
Hall 2Topological variants of WAF implementation Dugin A., MTS 14:15
Hall 2Heuristic algorithms for detecting malicious code Security expert 15:15
Hall 2Distributed systems for detecting computer attacks Security expert 16:00
Hall 2Features of the development of incident management systems Security expert 16:30
Hall 2FailOpen: how WAF becomes useless with protection of modern web applications Petukhov A., SolidLab 17:00

Call for papers

Want to become a speaker?
Send an application with a description of the subject to info@pentestit.ru.

Greetings of conference guests

Roman Romanov, Luka Safonov, Pentestit

The implementation of the GSM protocol stack based on OsmocomBB

Anton Gorbachev, Pentestit

Using the radare2 framework in reverse engineering to analyze binary files

Dmitry Lobzin, Pentestit

Detection of vulnerabilities in car alarms

Nikolay Krivosheya, NPO "ECHELON"

Identification of the user on the Internet based on HTTP cookies

Security Expert

Symbolic code execution techniques for analyzе of executable modules

Security Expert

Automation of OSINT

Alexey Vosyadov, Pentestit

Vulnerabilities of IoT/embedded devices

Luka Safonov, Pentestit

Static analysis of Dalvik bytecode

Eugene Minibaev, Innopolis University

Meta-polymorphic-evasive shellcodes and MorphEUS utility

Maksim Zaytsev, ENKI (France)

Presentation of Burp Suite plug-in from Vulners for vulnerability detection

Kirill Ermakov, QIWI

Forensic analysis OS Windows

Security Expert

Topological variants of WAF implementation

Andrey Dugin, MTS

Heuristic algorithms for detecting malicious code

Security Expert

Distributed systems for detecting computer attacks

Security Expert

Features of the development of incident management systems

Security Expert

FailOpen: how WAF becomes useless with protection of modern web applications

Andrey Petukhov, SolidLab

Conference Venue

Russia, Orel, Kromskoy's highway, 4, Congress Hall "Grinn" - a modern six-story complex, which has no equal in Russia in terms of the level of transformation of premises and technical equipment.