en
Display fullscreen
Ticket lost ?
Click here
|
English
Francais
English
Español
Italiano
Deutsch
Português
Dutch
Step
Choice of date
Basket
Options
Details
Checkout
Confirmation
Outils
Last order
Modify email order
Last name
First name
New email
Submit
Ship the order again
Type the email address used for your order
Cancel
Submit
Download my tickets
Download complete
Email
Last 4 digits of the bank card
Cancel
Download
Check if there is an order in your name
Last name
First name
Order date
Check
Conference | 15th - 17th April 2026
Conference ticket (regular price)
Ends in 62 days
Main conference (15 to 17 April 2026 in Reims, France), including all lunches, coffee breaks, gala dinner. Does not include the optional workshops on April 14th.
Read more
370.00
€
Included
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
A choice will be proposed to you in the next step
Law enforcement conference ticket
Ends in 62 days
Main conference (15 to 17 April 2026 in Reims, France), including all lunches, coffee breaks, gala dinner. Does not include the optional workshops on April 14th.
Only available for law enforcement personnel. Specific checks will be made before payment.
Read more
230.00
€
Included
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
A choice will be proposed to you in the next step
Student / Unemployed conference ticket
Ends in 62 days
Main conference (15 to 17 April 2026 in Reims, France), including all lunches, coffee breaks, gala dinner. Does not include the optional workshops on April 14th.
Only available for students or people registered as unemployed. Specific checks will be made before payment. Pleae use a student email when registering as a student.
Read more
135.00
€
Included
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
A choice will be proposed to you in the next step
(Option) Guest at gala dinner
Ends in 63 days
This option allows you to bring a friend or a partner at the gala dinner (Thursday 16th April 2026)
Read more
31.00
€
Included
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
A choice will be proposed to you in the next step
Workshops | 14th April 2026 (Only accessible for full conference attendees)
All workshops in parallel - Includes lunch and coffee break
WS1 - Advanced Android Malware Analysis: Defeating Obfuscation in the Real World (13h00-18h00)
Alessandro Strino
Android malware analysis can be intimidating, especially when samples employ aggressive obfuscation, layered encryption, anti-analysis techniques, and native code to conceal their behavior. This workshop is designed to guide analysts beyond these barriers and into a disciplined, scientific approach to understanding what modern Android malware actually does. Rather than treating obfuscation as a blocker, the workshop focuses on identifying it, understanding its purpose, and actively defeating it. Participants will learn how to recognize common and advanced obfuscation patterns, isolate relevant logic, and reconstruct the overall malware execution flow. The methodology presented combines static reverse engineering with dynamic analysis and runtime instrumentation, reflecting real-world workflows used by professional malware analysts.
A core theme of the workshop is analyst efficiency and automation. Attendees will explore techniques to dynamically resolve encrypted code paths, automatically identify and neutralize encryption routines, and interact with malware at runtime. This includes injecting into the execution flow, patching binaries or memory on the fly, and forcing the execution of specific instructions to extract hidden behavior.
The workshop begins with a custom-built Android application and progressively introduces techniques commonly found in modern Android malware. These techniques are applicable across malware families, including banking trojans, spyware, and more advanced threats, and are not tied to a single campaign or actor. To make the overall learning experience effective, the workshop includes a custom Capture the Flag (CTF) designed specifically for attendees. The challenges mirror real-world analysis scenarios, allowing participants to apply the techniques covered during the sessions immediately.
Read more
85.00
€
Included
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
A choice will be proposed to you in the next step
WS2 - Malware symbol recovery with Ghidra using Golang examples (13h30-17h30)
Max 'Libra' Kersten
Every time you open a malware sample in your favourite analysis tool and you are greeted with hundreds or thousands of functions with unknown names, you know it is time to find shortcuts and automate renaming steps whenever possible. This workshop dives into the recovery of function symbols. The examples in this workshop are all Golang related as the static compilation of Golang binaries serve as excellent examples.
During this four hour workshop, you will dive into two different malware families which were used in the wild by threat actors, and find out how function symbol recovery works and how to apply the theory in practice. You will also learn how to create your own symbol databases, allowing you to use your privately analysed malware as the starting point for further research into the development of those malware families. Additionally, you will better understand how source code and compiled code relate, especially with regards to Golang files.
Note that the taught techniques are applicable for any binary supported by Ghidra. You can reuse the techniques in other tools, albeit with (minor) changes depending on the specifics.
Read more
75.00
€
Included
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
A choice will be proposed to you in the next step
WS3 - Threat detection engineering with Suricata (13h30-17h30)
Éric Leblond and Peter Manev
This hands-on workshop provides an in-depth exploration of advanced techniques for maximizing network threat detection using Suricata. Building upon core Suricata capabilities, this session delves into critical areas such as effective utilization of metadata keywords, including MITRE and regular metadata, to enrich detection context.
Participants will learn practical methods for achieving fast Indicator of Compromise (IOC) matching and strategies for managing multiple Suricata versions within diverse environments.
The workshop will also cover leveraging the Suricata Language Server (SLS) for rule development and optimization, including interpreting performance hints and implementing Continuous Integration (CI) for rulesets using SLS in batch mode.
This session is designed for cybersecurity professionals seeking to enhance their Suricata expertise and implement cutting-edge threat detection strategies. Attendees will leave equipped with actionable techniques and practical examples to improve their organization's security posture.
Read more
75.00
€
Included
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
A choice will be proposed to you in the next step
Secure payment - Billetweb
Secure payment - Billetweb
None
The number of elements to select is
Please choose at least one of the following
If you do not complete all of the choices now, you can do so from the link at the bottom of your purchase confirmation email.
The minimum number of selectable elements is
The maximum number of selectable elements is
Maximum amount for card payment is
You must select at least one product
Minimum amount is not reached
Your browser blocks cookies. Please enable cookies from billetweb.fr in order to use the box office.
Your browser blocks cookies from third parties. Please allow these cookies in order to use the box office.
Your browser blocks cookies. Allow cookies or
Click here
A choice will be proposed to you in the next step
These products cannot be purchased alone
Next
You can enter your code just before payment