Topics
- Critical Infrastructure Security, SCADA environments..
- Hacking, cracking, phreaking, virii, WiFi, VoIP, GSM..
- Console and gaming hacking
- Hardware Hacking, Jtag, SWJ, Dap..
- Reverse engineering, debugging, hooking, fuzzing, exploiting..
- Mobile terminals: android, iOS, Windows mobile, maemo..
- APT, botnets and malware
- Innovative tools and techniques both for defense and attack
- Cryptographical techniques, steganography, covert channels..
- (In)security cloud, virtual environments..
- Forensics and antiforensics
Who should Attend
Attendees from the security community including students, professionals, businesses, hobbyists, state forces, hackers, artists and academics.