Saturday |
| |
Please sign your artefacts. WITH WHAT?
|
Olle E. Johansson |
Security |
10:30 |
10:55 |
| |
Demystifying Post-Quantum Cryptography: The Hybrid Approach
|
Rutvik Kshirsagar, Shreyas Mahangade, Clemens Lang |
Security |
11:00 |
11:25 |
| |
Streamlining Signed Artifacts in Container Ecosystems
|
Tonis Tiigi |
Security |
11:30 |
11:55 |
| |
Sequoia git: Making Signed Commits Matter
|
Neal H. Walfield |
Security |
12:00 |
12:25 |
| |
An Endpoint Telemetry Blueprint for Security Teams
|
Victor Lyuboslavsky |
Security |
12:30 |
12:55 |
| |
Invisible Hypervisors: Stealthy Malware Analysis with HyperDbg
|
Björn Ruytenberg, Sina Karvandi |
Security |
13:00 |
13:25 |
| |
The invisible key: Securing the new attack vector of OAuth tokens
|
Gianluca Varisco |
Security |
14:00 |
14:25 |
| |
Dynamic Bot Blocking with Web-Server Access-Log Analytics
|
Alexander Krizhanovsky |
Security |
14:30 |
14:55 |
| |
Finding backdoors with fuzzing
|
Michaël Marcozzi, Dimitri Kokkonis, Stefano Zacchiroli |
Security |
15:00 |
15:25 |
| |
Island: Sandboxing tool powered by Landlock
|
Mickaël Salaün |
Security |
15:30 |
15:55 |
| |
Using Capslock analysis to develop seccomp filters for Rust (and other) services
|
Adam Harvey |
Security |
16:00 |
16:25 |
| |
The Open-Weight Dilemma: Mitigating AI Cyber Risks Without Killing Open Source
|
Alfonso De Gregorio |
Security |
16:30 |
16:55 |
| |
It's Time to Audit Open Source: Success Stories with OSTIF
|
Amir Montazery |
Security |
17:00 |
17:25 |
| |
Supply chain security meets AI: Detecting AI-generated code
|
Philippe Ombredanne |
Security |
17:30 |
17:55 |
| |
AI Security Monitoring: Detecting Threats Against Production ML Systems
|
samuel desseaux |
Security |
18:00 |
18:25 |
| |
Zero Trust in Action: Architecting Secure Systems Beyond Perimeters
|
Samvedna Jha, Suneetha |
Security |
18:30 |
18:55 |
Sunday |
| |
The state of Go
|
Maartje Eyskens |
Go |
09:00 |
09:30 |
| |
Profile-Guided Optimization (PGO) in Go: current state and challenges
|
Alexander Zaitsev |
Go |
09:30 |
10:00 |
| |
Brewed for Speed: How Go’s Green Tea GC Works
|
Jesús Espino |
Go |
10:00 |
10:30 |
| |
Inside Reflection
|
Valentyn Yukhymenko |
Go |
10:30 |
11:00 |
| |
Understanding Why Your CPU is Slow: Hardware Performance Insights with perf-go
|
Christian Simon |
Go |
11:00 |
11:30 |
| |
Concurrency + Testing = synctest
|
Ronna Steinberg |
Go |
11:30 |
12:00 |
| |
gomodjail: library sandboxing for Go modules
|
Akihiro Suda |
Go |
12:00 |
12:30 |
| |
Resilient file uploading with Go
|
Marius Kleidl |
Go |
12:30 |
13:00 |
| |
Extending sqlc: augmented generation of repositories in Go
|
Nikolay Kuznetsov |
Go |
13:00 |
13:30 |
| |
How to Instrument Go Without Changing a Single Line of Code
|
Kemal Akkoyun, Hannah Kim |
Go |
13:30 |
14:00 |
| |
Making of GoDoctor: an MCP server for Go development
|
Daniela Petruzalek |
Go |
14:00 |
14:30 |
| |
Systems Programming: Lessons from Building a Networking Stack for Microcontrollers
|
Patricio WHITTINGSLOW |
Go |
14:30 |
15:00 |
| |
Modularizing a 10-Year Monolith: The Architecture, The People, and the Pain
|
Victor Lyuboslavsky |
Go |
15:00 |
15:30 |
| |
My old trains have a second life, with TinyGo!
|
Florian Forestier |
Go |
15:30 |
16:00 |
| |
Go Around The World Without Wires
|
Ron Evans |
Go |
16:00 |
16:30 |
| |
Go Lightning Talks
|
Maartje Eyskens |
Go |
16:30 |
17:00 |