-
10:00
Analyzing Prerequistes of known Deserializtion Vulnerabilities on Java Applications
-
Bruno Kreyssig
(Umeå University)
-
10:15
Verifiable credentials solves all problems
-
Mikael Frykholm
(Sunet)
-
10:45
Twenty years later: Evaluating the Adoption of Control Flow Integrity
-
Sabine Houy
(Umeå University)
-
11:00
Dungeons & Dragons: The security tool you didn’t know you needed
-
Klaus Agnoletti