09:00
-
09:50 | Introduction by Raphaël Conz (SPEI, Canton de Vaud)
(KEYNOTE) The AI Paradox: Safety vs Performance by Rachid Guerraoui | CLOSED | |
---|
10:00 - 10:30 | COFFEE |
---|
10:30 - 11:20 | The Rise of AI-Driven Malware: Threats, Myths, and Defensesby Candid Wuest | The Spy Who Flashed Me: Exploring and defeating physical access control systemsby Michael Rodger | Threat Landscape 2025 and the implication of the Russian / Ukraine War on Cybersecurity for Europeby Raphaël Marichez (Palo Alto Networks) | |
---|
11:30 - 12:20 | Good Models Gone Bad: Visualizing Data Poisoningby Maria Khodak | Cache Me If You Can: Smuggling Payloads via Browser Caching Systemsby Aurélien Chalot | CLOSED | Présentation (avant-première) Offre Micro-SOCby Orange Cyberdefense Switzerland |
---|
12:30 - 13:30 | LUNCH |
---|
13:30 - 14:20 | “A Slice of” Modern Program Analysisby Kyle Martin | The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques)by Dhiraj Mishra | CLOSED | |
---|
14:30 - 15:20 | Don't let Jia Tan have all the fun: hacking into Fedora and OpenSUSEby Thomas Chauchefoin & Maxime Rinaudo | Malware analysis with R2AIby Axelle Apvrille | CLOSED | |
---|
15:30 - 16:00 | COFFEE |
---|
16:00 - 16:50 | Your Identity is Mine: Techniques and Insights from OS Identity Providers Researchby Maor Abutbul | Data Sets That Can Make A Difference: Improving Your Hunting and Detection in Entra ID and O365by John Stoner | CLOSED | |
---|
17:00 - 17:50 | Go Parser Footgunsby Vasco Franco | Beyond the Surface: Exploring Attacker Persistence Strategies in Kubernetesby Rory McCune | CLOSED | |
---|
18:00 - 05:00 | CTF
(AUDITORIUM A) |