| 1. | HUGO TESO Sweet Tools O' Mine | 401 | |
|
| 2. | RUBEN GARROTE & RUBEN RODENAS TLOTA The lord of the ATMs | 159 | |
|
| 3. | JAIME PEÑALBA The Worst Bug Bounty Ever DIA 2 | 126 | |
|
| 4. | JUAN ALONSO La webcam ese instrumento musical desconocido | 45 | |
|
| 5. | JAVIER SORIA Hace falta un ¡¡firewall cerebro verbal¡¡ | 73 | |
|
| 6. | MIKAEL CHALA Seguridad en operadores móviles virtuales | 51 | |
|
| 7. | MIKKO HYPPONEN World War I | 111 | |
|
| 8. | JOSE ALEJANDRO RIVAS What your mother never told you about TEE | 103 | |
|
| 9. | ABEL VALERO Radare2 1 0 | 44 | |
|
| 10. | NUEVOS ENFOQUES DE SEGURIDAD EN UN BANCO DIGITAL Juan Francisco Losa | 42 | |
|
| 11. | ACTUALIZANDO DEVOPS A SECDEVOPS Paúl Santapau | 15 | |
|
| 12. | OMAR BENJUMEA DevOPS & Fondue | 22 | |
|
| 13. | ALFONSO MUÑOZ & MIGUEL HERNANDEZ InSecurity graph database in real world | 31 | |
|
| 14. | PABLO SAN EMETERIO Inteligencia privada, más allá de STIX | 31 | |
|
| 15. | PAUL VIXIE Scaling Properties of Distributed System Security | 37 | |
|
| 16. | Dario Durando IoT Battle of Bots | 6 | |
|
| 17. | David Meléndez IoT Masterchef Cocinando un dron para hacking | 6 | |
|
| 18. | AUTHENTICODE PARA MALOTES Ramon Pinuaga | 4 | |
|
| 19. | HICHAM TOLIMAT How to Implement Internet's Hospital | 5 | |
|
| 20. | RISKY THINGS Juan Manuel Servera | 6 | |
|
| 21. | ROOTEDPANEL Historia de los delitos telemáticos en la Guardia Civil | 4 | |
|
| 22. | Juan Carlos Diaz & Jorge Rodriguez Villagrá All our MACs belong to everyone | 3 | |
|
| 23. | ROOTEDPANEL Ciberseguridad ¿límites a la libertad de prensa | 2 | |
|
| 24. | Daniel Hernández & César Gallego FEar will keep the local system online | 2 | |
|
| 25. | Carlos Hernández Lugares fantásticos y cómo encontrarlos | 6 | |
|
| 26. | HUGO TESO Comunidad de investigación sobre seguridad en aviación | 7 | |
|
| 27. | Ilfak Guilfanov Decompiler internals Microcode | 29 | |
|
| 28. | Alfonso Muñoz & Jorge Cuadrado Phreaking is alive Abusing GSM | 3 | |
|
| 29. | Alejandro Fernández Build your Own Continuous Deployment Infrastructure | 2 | |
|
| 30. | DANIEL GARCIA & ROBERTO MUÑOZ Docker puede no ser tu amigo | 4 | |
|
| 31. | DAVID MELENDEZ De casa se viene llorado | 6 | |
|
| 32. | RootedPanel Reservistas contra ciberataques | 1 | |
|
| 33. | Tamara Álvarez Se puede hackear un referendum nacional | 2 | |
|
| 34. | DEVOPS FROM SCRATCH TO Jacinto José Cruz | 4 | |
|
| 35. | FERNANDO RUBIO & VICTOR RECUERO Advanced Threat Analytics | 2 | |
|
| 36. | Tomás Isasia & Miguel Martín Hacking Cooking Mamma | 1 | |
|
| 37. | Joaquín Molina MENSAJERÍA Y TRANSPORTE, QUIERO MI PAQUETE y el tuyo RootedCON 2018 ENG | 2 | |
|
| 38. | Gerardo García Peña Crypto Goofs | 5 | |
|
| 39. | ROOTEDCON Keynote | 8 | |
|
| 40. | Abel Valero VM VFS = The Wooden Horse | 3 | |
|
| 41. | José Vila Otro parche más No, por favor | 2 | |
|
| 42. | Entrega de Premio Antonio Ropero a Fermín J Serna | 20 | |
|
| 43. | Gal Elbaz & Eran Vaknin Beware of the Bashware | 7 | |
|
| 44. | Juan Antonio Calles & Patricia Rada Biohacking | 4 | |
|
| 45. | Pedro Cabrera Ataques SDR a Smart TV's URL y channel injection | 1 | |
|
| 46. | RAUL SILES WhatsApp End To End Encryption Demystified | 9 | |
|
| 47. | PEPE VILA Loophole Timing Attacks on Shared Event Loops in Chrome | 9 | |
|
| 48. | Jesús Seijas Fooling Computer Vision | 8 | |
|
| 49. | Victor M Mundilla & José Torres Seguro que son seguras | 3 | |
|
| 50. | Jose Selvi FIESTA an HTTPS side channel party | 2 | |
|
| 51. | Ismael Benito & Arnau Gàmez Hacking Tokens A massive POC | 7 | |
|
| 52. | Dani cr0hn García Crawlino the new level of the crawling systems | 1 | |
|
| 53. | Eneko Astorquiza Retos de Seguridad en el Sector de las Apuestas Deportivas | 3 | |
|
| 54. | CAN YOU HEAR THE HUM Alon Menczer RootedCON 2017 ESP | 3 | |
|
| 55. | RICARDO J RODRIGUEZ Seguridad del DNIe3 0 ¿más problemas que soluciones | 4 | |
|
| 56. | Sergio de los Santos Breaking out HSTS and HPHP | 3 | |
|
| 57. | Javier Rodríguez & David Sánchez ¿Otra vez tu, Tovarich | 2 | |
|
| 58. | Deception y cómo proteger el dato mediante tecnologías Data Discovery | 1 | |
|
| 59. | Jonathan Shimonovich CERTIFI GATE Has your Android device been Pwned | 0 | |
|
| 60. | José Picó & David Perez Atacando 3G Vol 3 | 0 | |
|
| 61. | Juan Garrido Attack is old Defense is Cooler | 0 | |
|
| 62. | Laura Garcia & Ricardo J A Journey through iOS Malware Landscape | 0 | |
|
| 63. | Matias Katz Hardware Backdooring X11 with much class and no privileges | 0 | |
|
| 64. | Pablo S Emeterio & José M Cañete Vigilancia autónoma con drones | 0 | |
|
| 65. | Pedro Cabrera All your bebop drones still belong to us drone hijacking | 0 | |
|
| 66. | Raul Siles La cena de los idIoTas | 0 | |
|
| 67. | ACTUALIZANDO DEVOPS A SECDEVOPS Paúl Santapau | 0 | |
|
| 68. | ALFONSO MUÑOZ & MIGUEL HERNANDEZ InSecurity graph database in real world | 0 | |
|
| 69. | RUBEN GARROTE & RUBEN RODENAS TLOTA The lord of the ATMs | 4 | |
|
| 70. | YIHAN LIAN & ZHIBIN HU Smarter Peach Add Eyes to Peach Fuzzer | 2 | |
|
| 71. | AUTHENTICODE PARA MALOTES Ramon Pinuaga | 0 | |
|
| 72. | MIKKO HYPPONEN World War I | 6 | |
|
| 73. | CAN YOU HEAR THE HUM Alon Menczer RootedCON 2017 ENG | 2 | |
|
| 74. | NUEVOS ENFOQUES DE SEGURIDAD EN UN BANCO DIGITAL Juan Francisco Losa | 0 | |
|
| 75. | DAVID MELENDEZ De casa se viene llorado | 0 | |
|
| 76. | DEVOPS FROM SCRATCH TO Jacinto José Cruz | 3 | |
|
| 77. | OMAR BENJUMEA DevOPS & Fondue YouTube | 0 | |
|
| 78. | HICHAM TOLIMAT How to Implement Internet's Hospital | 0 | Guide |
|
| 79. | PABLO SAN EMETERIO Inteligencia privada, más allá de STIX | 0 | |
|
| 80. | HUGO TESO Comunidad de investigación sobre seguridad en aviación | 0 | |
|
| 81. | HUGO TESO Sweet Tools O' Mine | 0 | |
|
| 82. | PAUL VIXIE Scaling Properties of Distributed System Security | 1 | |
|
| 83. | JAIME PEÑALBA The Worst Bug Bounty Ever DAY 2 | 0 | |
|
| 84. | PEPE VILA Loophole Timing Attacks on Shared Event Loops in Chrome | 0 | |
|
| 85. | JAVIER SORIA Hace falta un ¡¡firewall cerebro verbal¡¡ | 0 | |
|
| 86. | RAUL SILES WhatsApp End To End Encryption Demystified | 1 | |
|
| 87. | JOSE ALEJANDRO RIVAS What your mother never told you about TEE | 2 | |
|
| 88. | JUAN ALONSO La webcam ese instrumento musical desconocido | 2 | |
|
| 89. | RICARDO J RODRIGUEZ Seguridad del DNIe3 0 ¿más problemas que soluciones | 2 | |
|
| 90. | MIKAEL CHALA Seguridad en operadores móviles virtuales | 1 | |
|
| 91. | ABEL VALERO Radare2 1 0 | 2 | |
|
| 92. | RISKY THINGS Juan Manuel Servera | 4 | |
|
| 93. | ROOTEDCON Keynote | 3 | |
|
| 94. | ROOTEDPANEL Historia de los delitos telemáticos en la Guardia Civil | 1 | |
|
| 95. | Raúl Siles Android Back to the Future Too or Two | 6 | |
|
| 96. | RootedPanel Cyberweapons | 23 | |
|
| 97. | C Lorenzana & J Rodriguez Why call APT's, when what they mean is money | 15 | |
|
| 98. | Jose L Verdeguer & Víctor Seva Secure Communications System | 17 | |
|
| 99. | José Luis Quintero & Felix Estrada From War Games to Die Hard 4 | 2 | |
|
| 100. | Francisco J Gómez & Carlos J Diaz Sinfonier | 5 | |
|