Time |
D
|
#RP |
Title |
Name(s)
|
LOC |
RP |
#stds |
9h35
|
|
|
Welcome,
introduction. |
Cees
de Laat |
|
|
|
9h40 |
20
|
26
|
Open
source SOC demonstration.
|
Jenda
Brands |
OS3
|
1
|
1
|
10h00
|
20
|
38
|
Research
into new naming and identification systems on the internet. |
Xander
Lammertink |
SIDN
|
2
|
1
|
10h20
|
20
|
65
|
Graph
theory for domain name registries.
|
Auke
Zwaan |
SIDN
|
1
|
1
|
10h40 |
20 |
|
break |
|
|
|
|
11h00
|
20
|
39
|
Performance
measurement and tuning of remote acquisition.
|
Lukasz.Makowski
|
NFI
|
1
|
1
|
11h20
|
25
|
31
|
Security
features of Android for Work.
|
Tom
Curran, Ruben de Vries |
KPMG
|
1
|
2
|
11h45
|
25 |
66
|
Detecting
BGP hijacks for a large number of Dutch networks.
|
Jeroen
Schutrup, Bram ter Borch |
NCSC
|
1
|
2
|
12h10
|
|
|
Lunch |
|
|
|
|
13h00
|
25
|
30
|
Investigating
the new Android 6.0 native fingerprint API.
|
Thom
Does, Mike Maarse |
KPMG
|
1
|
2
|
13h25
|
20 |
33
|
Greening
the Cloud.
|
Jeroen
van Kessel |
SNE
|
2
|
1 |
14h45
|
25 |
29
|
Misusing
open internet services on the Web.
|
Ben de
Graaff, Jelte Fennema |
KPMG
|
1
|
2
|
14h10 |
15
|
|
bio break
|
|
|
|
|
14h25
|
20
|
55
|
Risk
detection with a UAV.
|
Yadvir
Singh |
KPMG
|
1
|
1
|
14h45
|
25
|
56
|
Penetration
test auditibality.
|
Stamatios
Maritsas, Alexandros Tsiridis |
KPMG
|
1
|
2
|
15h10 |
25
|
50
|
Container
Networking in the GTS.
|
Siem
Hermans, Patrick de Niet |
SNE
|
1
|
2
|
15h35 |
15
|
|
break |
|
|
|
|
15h50
|
25
|
57
|
Investigation
into the maliciousness of short url’s.
|
Peter
Boers, Robert Diepeveen |
KPMG
|
1
|
2
|
16h15
|
20
|
20
|
Design
exploration of transparency enhancing technology.
|
Mathijs
Houtenbos |
WhiteBox
|
2
|
1
|
16h35
|
|
|
*
|
End
|
|
|
|