Time |
Amphitheater Hall |
Press Hall |
Valdai Hall |
Seliger Hall |
Workshop |
Conference Hall A |
Conference Hall B |
8:00-9:30 |
REGISTRATION
|
9:30-10:00 |
OPENING
|
10:00-11:00 |
OpeningInformation security today: the splendour and misery of corporate securityPlenary sessions. DiscussionsModerator: Boris SimisParticipants: Vitaly Lyutikov, Artem Sychev, Sergey Lebed |
Attacks on video converter: a year later
Emil Lerner and Pavel Cheremushkin
|
Hackers need your bank more than your clients
Dmitry Volkov |
Internal security awareness (QIWI) - Ekaterina Pukhareva
Secure service-oriented architecture. Smart home voice control as a case study - Wire Snark
Interface through web analyst's eyes: experience with usage of web analytics widgets on online banking login pages - Dmitry Pavlov
|
|
|
|
11:00-11:30 |
Live dissection: anatomy of a router-based botnet
Maxim Goncharov and Ilya Nesterov |
DIY anti-APT
Danil Borodavkin |
Will your business stand a ransomware? - Yulia Omelyanenko
Risk management: how to abandon illusions - Alex Smirnoff
|
Modern techniques and tools in malware analysis
Ivan Piskunov |
Innovations in protection tools and security tests
Moderators: Anton Ivanov and Egor Nazarov
Among the participants: Anastasya Novikova, Alexander Bugaev, Denis Kalemberg, Yuri Shulga |
|
11:30-12:00 |
Information security tomorrow: is it a stop factor for digitalization of economy?Plenary sessions. ReportsModerator: Alexey KachalinParticipants: Alexey Sokolov, Sergey Plugotarenko, Kirill Kertsenbaum, Denis Baranov, Ilya Sachkov, Dmitry Finogenov, Georgy Gritsay, Roman Chaplygin, Vyacheslav Kasimov |
12:00-13:00 |
Hadoop safari: hunting for vulnerabilities
Mahdi Braik and Thomas Debize |
Ransomware incidents forensics
Mona Arkhipova |
Techniques to protect Java apps and ways to bypass them - Philip Lebedev
Backdooring LTE modem radio channel kernel - Andrey Lovyannikov
The evolution of Trojan memory sticks - Andrey Biryukov
|
|
13:00-14:00 |
WhatsApp & Telegram account take-over
Roman Zaikin |
Developing secure homebrewed products
Moderator: Dmitry Gusev
Participants: Alexey Smirnov, Vladimir Rubanov, Pavel Osipenko, Dmitry Gorelov, Pavel Eyges, Evgeny Sidorov
|
Cyber Defense Operations Center—Microsoft experience
Andrei Miroshnikov |
How to find zero-days in the Linux kernel - Andrey Konovalov
Exploring billion states of a program like a pro. How to cook your own fast and scalable DBI-based security tool. A case study - Maksim Shudrak
Non-signature-based detection of PHP backdoors - Gregory Zemskov
The other side of DDoS - Krassimir Tsvetanov
|
IPv6 network reconnaissance
Fernando Gont |
|
Anti-APT Swiss knife
Kirill Mikhailov, Andrey Semenyuchenko, Anatoly Viklov |
14:00-15:00 |
Meet and greet the macOS malware class of 2016
Patrick Wardle |
SOC in a large corporate network: challenge accepted
Andrey Dugin |
Lightning Talks (section)
Andrey Petukhov |
Nonpublic section from Informzaschita
Evgeny Klimov |
15:00-16:00 |
DDoS attacks in 2016–2017: a breakthrough
Artyom Gavrichenkov |
Developing DBFW from scratch
Denis Kolegov and Arseny Reutov |
SOC Evolution 2017
Moderators: Elman Beybutov, Vladimir Bengin, Alexey Kachalin |
DIY tablet PC for hacking
Andrey Biryukov |
Hacker in a trap: A practical demonstration of how to block exploits and ransomware
Denis Batrankov |
16:00-17:00 |
IoT (in)security
Moderator: Alexey Lukatsky
Participants: Igor Girkin, Alexander Butenko, Dmitry Berezin, Pavel Novikov, Grigory Marshalko, Nikita Utkin, Vladislav Shershulsky |
Your money and your data threat sentry
Young Hak Lee |
How we hacked distributed configuration management systems
Francis Alexander and Bharadwaj Machiraju |
ICS information securityModerators: Roman Krasnov, Dmitry DarenskyParticipants: Ruslan Stefanov, Evgeny Gengrinovich, Andrey Nuykin, Denis Babaev, Alexey Petukhov, Pavel Lutsik |
17:00-18:00 |
Phishing: size of the problem and countermeasures
Moderator: Vyacheslav Borilin
Speakers: Dmitry Malyshev, Nikolay Agninsky and Alexander Mitrokhin
|
Do WAFs dream of static analyzers?
Vladimir Kochetkov |
|