| 2025-04-03 | Talk | Blackhat |
ObfusQate: Where Quantum Magic Meets Code Security β Say Goodbye to Easy Cracking!
| Vivek Balachandran, Nikhil Bartake, Zi Jie See Toh, Michael Kasper | #secure-coding#quantum-computing#software-security |
| 2025-03-02 | Talk | Nullcon |
Satellite Communications: Analyzing and Protecting Space-Based Assets
| Drishti Jain | #network-pentesting#ics-security#encryption+4 |
| 2024-09-20 | Talk | 44con |
Unveiling the ghosts of mobile networks: When will old bugs die?
| Altaf Shaik | #5g#authentication#encryption+3 |
| 2024-08-09 | Talk | Defcon |
Breaking Secure Web Gateways (SWG) for Fun and Profit
| Vivek Ramachandran, Jeswin Mathai | #ssl#application-pentesting#secure-coding+3 |
| 2024-04-18 | Tool demo | Blackhat |
Secure Local Vault - Git Based Secret Manager
| Sriram Krishnan, Shibly Meeran | #blueteam#application-hardening#secure-coding+2 |
| 2023-08-07 | Talk | C0c0n |
Homomorphic Encryption - Myth to Reality
| Anish Koshy | #encryption#architecture#data-protection+1 |
| 2023-05-11 | Tool demo | Blackhat |
Post-Quantum Cryptography Library
| Sagar Bhure, Shain Singh | #encryption#quantum-computing#secure-development+3 |
| 2021-11-12 | Talk | C0c0n |
Data Security and Privacy
| Abhilasha Vyas | #data-protection#encryption#data-loss-prevention+3 |
| 2020-09-18 | Talk | C0c0n |
Broken Cryptography & Account Takeover
| Harsh Bothra | #encryption#ssl#security-testing+2 |
| 2019-09-27 | Talk | C0c0n |
Securing Payment Data with PCI Security Standards and Programs
| Nitin Bhatnagar | #blueteam#data-protection#secure-development+3 |
| 2019-08-05 | Tool demo | Blackhat |
CertPivot: Infra-Chaining + Cert-Check
| Ajit Hatti | #incident-management#threat-hunting#ssl+1 |
| 2018-12-05 | Talk | Blackhat |
The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols
| N Asokan, Lachlan Gunn, Ricardo Vieitez Parra | #red-teaming#encryption#threat-modeling+1 |
| 2018-09-06 | Talk | Grrcon |
Crypto Gone Rogue: A Tale of Ransomware, Key Management and the CryptoAPI
| Pranshu Bajpai, Richard Enbody | #encryption#ransomware#dynamic-analysis+1 |
| 2018-08-12 | Talk | Defcon |
Last mile authentication problem: Exploiting the missing link in end-to-end secure communication
| Siddharth Rao, Thanh Bui | #encryption#authentication#ipc+1 |
| 2017-07-28 | Tool demo | Defcon |
GibberSense
| Ajit Hatti | #encryption#red-teaming#security-assessment |
| 2017-07-28 | Tool demo | Defcon |
Lamma 1.0
| Ajit Hatti, Antriksh Shah | #encryption#security-assessment#audit+1 |
| 2017-07-27 | Tool demo | Blackhat |
Gibber Sense
| Ajit Hatti | #secure-coding#reconnaissance#encryption+3 |
| 2017-06-24 | Talk | Lehack |
When encryption is not enough: Attacking Wearable - Mobile communication over BLE
| Sumanth Naropanth, Eliza Chelleng, Kavya Racharla | #bluetooth#device-security#encryption+3 |
| 2017-03-30 | Tool demo | Blackhat |
LAMMA 1.0
| Ajit Hatti | #encryption#security-assessment#static-analysis+1 |
| 2017-02-14 | Talk | Rsac |
Side-Channel Resistant Implementations
| Praveen Vadnala | #side-channel-attacks#embedded-security#encryption |
| 2016-08-06 | Tool demo | Defcon |
LAMMA (beta)
| Ajit Hatti | #encryption#security-assessment#audit+1 |
| 2016-08-04 | Tool demo | Blackhat |
LAMMA
| Ajit Hatti | #encryption#security-assessment#audit+1 |
| 2015-11-05 | Talk | Groundzerosummit |
Elliptical Curve Cryptography
| Aneesha S | #encryption#elliptic-curve-cryptography#secure-development+1 |
| 2015-11-05 | Talk | Groundzerosummit |
Economics of Post Quantum Crypto Systems : Do we really Need it
| Ajit Hatti | #encryption#quantum-computing#security-strategy+1 |
| 2015-06-16 | Talk | Blackhat |
The Savage Curtain: Mobile SSL Failures
| Tushar Dalvi, Tony Trummer | #ssl#mobile-application-management#application-pentesting+1 |
| 2015-05-28 | Talk | Hitbsecconf |
The Savage Curtain: Mobile SSL Failures
| Tushar Dalvi, Tony Trummer | #ssl#security-assessment#mobile-application-management+1 |
| 2015-03-03 | Award | |
FREAK Attack
| Karthikeyan Bhargavan, Mi Tls Team | #ssl#encryption#vulnerability-discovery |
| 2015-01-27 | Talk | Owaspappseccalifornia |
The Savage Curtain : Mobile SSL Failures
| Tushar Dalvi, Tony Trummer | #ssl#application-pentesting#dynamic-analysis |
| 2014-11-21 | Talk | Deepsec |
Mobile SSL Failures
| Tushar Dalvi, Tony Trummer | #ssl#android-security#ios-security+3 |
| 2014-11-13 | Talk | Groundzerosummit |
Attacking Cryptography & PKI Implementations
| Ajit Hatti | #encryption#red-teaming#ssl+4 |
| 2014-08-22 | Talk | C0c0n |
Cryptocalypse, Heart Bleed : Is our Government Listening?
| Ajit Hatti | #encryption#ssl#cyber-law+3 |
| 2014-08-22 | Talk | C0c0n |
Cryptographic Backdoors: Subverting the RSA
| Adhokshaj Mishra | #encryption#red-teaming#security-strategy+3 |
| 2012-08-03 | Talk | C0c0n |
Data Security
| Alok Vijayant, S Bhansali | #data-protection#encryption#data-loss-prevention+3 |
| 2012-03-15 | Talk | Grrcon |
SCADA Security: Why is it so hard?
| Amol Sarwate | #scada#ics-security#authentication+2 |
| 2011-09-07 | Talk | Securitybyte |
Data Protection
| Dipankar Roy | #blueteam#data-loss-prevention#data-protection+1 |
| 2011-09-06 | Talk | Securitybyte |
Private Internet Circuits - Towards A Next Generation Internet
| Sanjay Deshpande | #network-architecture#encryption#network-defense |
| 2011-02-25 | Talk | Nullcon |
SSLSmart β Smart SSL Cipher Enumeration
| Gursev Singh Kalra | #encryption#ssl#security-assessment |
| 2010-02-25 | Talk | Nullcon |
Quantum Computing Challenges in the field of security
| Navin Pai | #quantum-computing#security-strategy#threat-modeling+3 |
| 2009-12-05 | Talk | Clubhack |
Open source for securing data with advanced Crypto-Steganography technology
| Suhas Desai | #encryption#steganography#blueteam |
| 2007-12-09 | Talk | Clubhack |
Mining Digital Evidence in Microsoft Windows β Answering Who, When, Why and How?
| Chetan Gupta | #forensics#windows#data-loss-prevention+4 |