Talks
2 Days of TROOPERS Trainings
All Inclusive
Conference Package
Talks
-
A SIM Hacking Odyssey: Can a SIM hack YOU?
Tomasz Lisowski Marius Muench
-
Backbones under attack: software vulnerabilities in core routers
Pierre Emeriaud
-
Confused Recovery: A New Attack Class on Windows Recovery
Alon Leviev
-
Delete Is Easy – Recovery Is Not: The Reality of Entra ID Backup & Restore
Klaus Bierschenk
-
Do Apps Have Imposter Syndrome? Unmasking Token Theft Campaigns
Sapir Federovsky Shahar Dorfman
-
Every Component Passed Review — So How Did the Agent Exfiltrate Everything?
Christian Schneider
-
Get in Loser, We're Upgrading the Internet -- Lessons from Deploying Post-Quantum Cryptography across Akamai's global Content Delivery Network
Jan Schaumann
-
KDS Root Keys: All Secrets Finally Revealed
Michael Grafnetter
-
Living Off The Pipeline: Defensive Research, Weaponized
François Proulx
-
Modern Adventures in Azure Privilege Escalation
Karl Fosaaen Thomas Elling
-
Nested APP Authentication - Undocumented Risk and Conditional Access Bypass
Jun Sheng Shi Shang-De Jiang
-
Priceless: Hacking Electronic Shelf Labels
Marius Karstedt
-
Tier Breakers: Blind Spots in Cloud-Managed PAWs
Thomas Naunheim Martin Sohn Christensen
-
Trusted by Design: How Windows Uses TPM to Secure PRTs
Dr Nestori Syynimaa
-
Unshelling VShell at Scale
Kazuya Nomura Rintaro Koike
-
V2X Wardriving - They Drive, We Listen
Dieter Schuster Nikolai Puch
-
Watch Your Kids: Hacking Children's Smartwatches
Nils Rollshausen
-
WhatsApp View Once: Four Exploits and a Funeral
Tal Be'ery