Presentations-rp2
Wednesday
June 29, 2016, Auditorium C0.110, FNWI, Sciencepark 904, Amsterdam.
Program:
10h00 |
D |
# |
Welcome. |
Cees de Laat |
Loc |
RP |
#stds |
10h00
|
20 |
35 |
Partitioning of big graphs.
|
Alexis
Sireta
|
UvA |
2
|
1 |
10h00
|
20 |
60 |
The effects of network
disruption on routing protocols and packet propagation.
|
Lukasz Makowski |
VU
|
2
|
1
|
10h20
|
20 |
89 |
The design of trojans
on modern hardware.
|
Jeroen van Prooijen |
VU
|
2
|
1
|
11h00 |
20
|
|
*
|
Break |
|
|
|
11h20
|
20 |
80 |
Restoring TCP sessions
with DHT.
|
Peter Boers
|
CumulusNetworks |
2
|
1
|
11h40
|
25 |
90 |
Supporting Internet of
Things applications in Information-Centric Networks. |
Olaf Elzinga, Jenda
Brands |
TNO |
1
|
2
|
12h05 |
65 |
|
*
|
Break |
|
|
|
13h00
|
20 |
95 |
P4 VPN Authentication;
Authentication of VPN Traffic on a Network Device with P4. |
Jeroen Klomp |
SURFnet |
2
|
1
|
13h20
|
20 |
23 |
Taking a closer look at
IRATI.
|
Koen Veelenturf
|
SURFnet/UvA
|
2
|
1
|
13h40
|
20 |
94 |
Modifying existing
applications for 100 Gigabit Ethernet.
|
Jelte Fennema |
SURFnet
|
2
|
1
|
14h00 |
|
|
Closing. |
Cees de Laat & OS3 team |
|
|
|
Thursday June 30, 2016, Auditorium C0.110, FNWI,
Sciencepark 904, Amsterdam.
Program:
10h00 |
D |
# |
Welcome. |
Cees de
Laat |
Loc |
RP |
#stds |
10h00
|
25 |
26 |
Evaluating the applicability of an
Industrial-Scale Software Defined Internet Exchange Point at the AMS-IX.
|
Siem Hermans, Jeroen Schutrup |
AMS-IX
|
2 |
2
|
10h25
|
25 |
21 |
Adding unusual data transports to the Serval
Project.
|
Alexandros Tsiridis, Joseph Hill |
Flinders |
2
|
2
|
10h50
|
20 |
96 |
Leader election and logical
organization in inter-cloud virtual machines.
|
Andrey Afanasyev |
UvA |
1
|
1
|
11h10
|
20
|
|
*
|
Break |
|
|
|
11h30
|
20
|
13
|
Designing an open source DMARC aggregation
tool. |
Yadvir Singh |
NLnet |
|
1
|
11h50 |
20 |
47
|
Automated access management
analysis on WordPress plugins using machine learning.
|
Frank Uitewaal |
DONGIT
|
2
|
1
|
12h10
|
20 |
92 |
A systematic approach towards GNSS receiver
vulnerability analysis.
|
Mike Maarse |
NLR
|
2
|
1
|
12h30 |
60 |
|
*
|
Break |
|
|
|
13h30
|
25 |
87 |
Bypassing 802.1X in an IPv6 environment.
|
Ruben de Vries, Robert Diepeveen |
Deloitte |
2
|
2
|
13h55
|
20 |
86 |
SS7/GSM OSINT.
|
Kenneth van Rijsbergen |
Deloitte |
1
|
1
|
14h15
|
25 |
88 |
SD card rubber ducky via SDIO.
|
Thom Does, Dana Geist |
Deloitte |
2
|
2
|
14h40 |
20
|
|
*
|
Break |
|
|
|
15h00
|
25 |
52 |
SSL session key extraction from memory on
mobile devices (Android, iOS).
|
Tom Curran, Marat Nigmatullin |
Deloitte
|
2
|
2
|
15h25
|
20 |
58 |
Extremely sensitive communication; Secure,
secret, and private e-mail.
|
Loek Sangers
|
KPMG
|
2
|
1
|
15h45
|
20 |
91 |
Using Extremely Sensitive Information in
Android.
|
Romke van Dijk |
KPMG |
2
|
1
|
16h05 |
|
|
Closing. |
Cees de
Laat & OS3 team |
|
|
|
|