Time | D | #RP | Title | Name(s) | LOC |
RP | #stds |
13h00 | |
|
Welcome, introduction. | Cees de Laat | |
|
|
13h05 | 20 |
20 |
Analysing ELF
binaries to find compiler switches that were used. |
Kenneth van
Rijsbergen |
Tjaldur |
2 |
1 |
13h25 | 20 |
16 |
Network Functions Virtualization. |
Bernardus Jansen |
SURFnet |
1 |
1 |
13h45 | 25 | 83 |
Netflow
Information Management. |
Shahrukh Zaidi,
Adrien Raulot |
SURFnet |
1 |
2 |
14h10 | 20 | bio break | |
|
|
|
|
14h30 | 20 | 89 | Protecting Red Team infrastructures. | Rick Lahaye | OutFlank | 2 |
1 |
14h50 | 20 | 50 | Virtual
infrastructure partitioning and provisioning under nearly real-time
constraints. |
Andrey Afanasyev |
SNE |
1 |
1 |
15h10 | 20 | 64 |
Improving Machine
Learning Based Intrusion Detection for SCADA Systems using case
specific information. |
Peter Prjevara |
Deloitte |
1 |
1 |
15h30 | 20 | break | |
|
|
|
|
15h50 | 25 | 42 | An Analysis of Atomic Swaps on and between Ethereum Blockchains. | Peter Bennink, Lennart van
Gijtenbeek |
TNO | 1 |
2 |
16h15 | 25 | 85 |
Real-time Video
Stream filtration for Data and Facial Anonymization. |
Swann Scholtes,
Chris Kuipers |
JC |
1 |
2 |
16h40 | |
|
*
|
End | |
|
|
Time | D | #RP | Title | Name(s) | LOC | RP | #stds |
10h10 | |
|
Welcome, introduction. | Cees de Laat | |
|
|
10h10 | 25 | 53 |
Feasibility of
Cryptocurrency on Mobile devices. |
Sander Lentink,
Anas Younis |
KPMG |
1 |
2 |
10h35 |
25 | 37 | Pentest
Accountability By Analyzing Network Traffic & Network Traffic
Metadata. |
Marko Spithoff,
Henk van Doorn |
KPMG |
1 |
2 |
11h00 | 15 | |
bio/coffee break | |
|
|
|
11h15 | 25 | 82 |
Fingerprinting
Websites with machine learning. |
Sjors Haanen, Tim
van Zalingen |
KPMG |
1 |
2 |
11h40 | 20 | 80 |
Container escape
methodologies. |
Rik Janssen |
KPMG |
1 |
1 |
12h00 | |
|
Lunch | |
|
|
|
13h00 | 20 | 57 |
Internet transport
protocol: mdtmFTP across distance at a 100Gb/s. |
Kees de Jong |
KLM |
1 |
1 |
13h20 | 20 | 86 |
Practical
Passphrase Cracking. |
Luc Gommans |
RadicallyOpenSecurity |
1 |
1 |
13h40 | 20 | |
bio/tea break | |
|
|
|
14h00 | 25 | 62 |
Research into
darkweb scraping. |
Dirk Gaastra,
Kevin Csuka |
Fox-IT |
1 |
2 |
14h25 | 25 | 61 |
Deanonymisation in
the Ethereum P2P Network. |
Tim Dijkhuizen,
Robin Klusman |
Fox-IT |
1 |
2 |
14h50 | 20 | |
bio break | |
|
|
|
15h10 | 25 |
14 |
Microsoft Office
Upload Center Cache Files in Forensic Investigations. |
Rick van Gorp,
Kotaiba Alachkar |
Fox-IT |
1 |
2 |
15h35 | 20 | 66 |
Profiling critical
path related algorithms for different graph families and deadlines
distributions. |
Henri Trenquier |
UvA |
1 |
1 |
15h55 | |
|
*
|
End | |
|
|