<?xml version='1.0' encoding='utf-8' ?>
<!-- Made with love by pretalx v2024.2.1. -->
<schedule>
    <generator name="pretalx" version="2024.2.1" />
    <version>1.2</version>
    <conference>
        <title>DCTF26</title>
        <acronym>dctf26</acronym>
        <start>2026-03-21</start>
        <end>2026-03-22</end>
        <days>2</days>
        <timeslot_duration>00:05</timeslot_duration>
        <base_url>https://cfp.dragonsec.si</base_url>
        <logo>https://cfp.dragonsec.si/media/dctf26/img/dctf26_flag_QEcvmdN.png</logo>
        <time_zone_name>Europe/Ljubljana</time_zone_name>
        
        
    </conference>
    <day index='1' date='2026-03-21' start='2026-03-21T04:00:00+01:00' end='2026-03-22T03:59:00+01:00'>
        <room name='PA' guid='da915239-c932-5fae-9774-072bfd5d2dbb'>
            <event guid='61f604d7-4300-5e1b-a7d9-a600b88798e6' id='28'>
                <room>PA</room>
                <title>Don&apos;t let them break you: a CTF infrastructure whitepaper</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-03-21T10:00:00+01:00</date>
                <start>10:00</start>
                <duration>00:25</duration>
                <abstract>Most infrastructure is built to be used; CTF infrastructure is built to be abused. When your user base consists of hundreds of hackers armed with weaponized 1-days and a competitive drive to bypass your guardrails, &quot;standard&quot; scalability and security models fall apart.

Drawing from two years of organizing on-site jeopardy competitions for several hundred participants, this talk deconstructs the unique intersection of high-concurrency DevOps and aggressive hardening. We will explore the &quot;war stories&quot; of managing real-time exploits, mitigating flag-sharing, and maintaining a satisfactory user experience in this unique and challenging environment.</abstract>
                <slug>dctf26-28-don-t-let-them-break-you-a-ctf-infrastructure-whitepaper</slug>
                <track></track>
                
                <persons>
                    <person id='35'>Rok &#352;tular</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf26/talk/R8ZTV9/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf26/talk/R8ZTV9/feedback/</feedback_url>
            </event>
            <event guid='db46e56c-9773-502a-9a37-6cdb2bc10f13' id='23'>
                <room>PA</room>
                <title>How do we effectively communicate about INFOSEC?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-03-21T10:30:00+01:00</date>
                <start>10:30</start>
                <duration>00:25</duration>
                <abstract>What is our responsiblity to the public, when it comes to talking about INFOSEC. Do we need to dazzle people with our tech brilliance? Do we need to show them how cool and nerdy we are? Do we need to scare the bejesus out of them? Probably, none of the above. Join me in this informal session and we can talk about it :).</abstract>
                <slug>dctf26-23-how-do-we-effectively-communicate-about-infosec-</slug>
                <track></track>
                <logo>/media/dctf26/submissions/YARFSQ/311604688_661737755313270_3392773489265245707_n_C2duqzI.jpg</logo>
                <persons>
                    <person id='11'>David  Modic</person>
                </persons>
                <language>en</language>
                <description>I will talk about some recent experiences and about how, in our field, we seem to be constantly going for shock and awe, rather than lowering the blood pressure of everyman. We should also discuss people skills, when it comes to voncersing with fellow humans.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf26/talk/YARFSQ/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf26/talk/YARFSQ/feedback/</feedback_url>
            </event>
            <event guid='155a22e1-8408-5f97-9054-349fc8abc729' id='36'>
                <room>PA</room>
                <title>From Beginner to Pro Hacker: Practical Approach to Offensive Security Training</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-03-21T11:30:00+01:00</date>
                <start>11:30</start>
                <duration>00:25</duration>
                <abstract>This session addresses the gap between theoretical knowledge and practical offensive security skills by presenting a hands-on training methodology based on realistic lab environments. It focuses on core techniques such as enumeration, exploitation, and post-exploitation, emphasizing the ability to chain vulnerabilities into complete attack paths. Drawing from recent penetration testing experience, it highlights how legacy systems and misconfigurations continue to expose modern infrastructures to compromise.</abstract>
                <slug>dctf26-36-from-beginner-to-pro-hacker-practical-approach-to-offensive-security-training</slug>
                <track></track>
                <logo>/media/dctf26/submissions/33KECY/CYBER-SEC_GNFwbzQ.png</logo>
                <persons>
                    <person id='17'>&#381;an Urban&#269;i&#269;</person><person id='19'>Danijela &#352;antak</person>
                </persons>
                <language>en</language>
                <description>Transitioning from theoretical knowledge to practical offensive security skills remains a significant challenge for many learners. While concepts are widely documented, the ability to apply them in realistic environments is often missing.
This session presents a methodology for developing hands-on skills through controlled lab environments that simulate real-world infrastructures. The focus is on core offensive techniques, including enumeration, vulnerability identification, exploitation, and post-exploitation, with an emphasis on chaining weaknesses into meaningful attack paths.
Drawing from recent penetration testing experience, including the discovery of vulnerabilities, the session highlights how legacy systems and misconfigurations continue to introduce exploitable conditions in modern networks.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf26/talk/33KECY/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf26/talk/33KECY/feedback/</feedback_url>
            </event>
            <event guid='7f227f65-3d4e-5999-8213-2b46d15ed5d0' id='25'>
                <room>PA</room>
                <title>Compliance of Electronic Products in the EU: From Electrical Safety and EMC to Cybersecurity under RED</title>
                <subtitle></subtitle>
                <type>Lecture</type>
                <date>2026-03-21T12:00:00+01:00</date>
                <start>12:00</start>
                <duration>00:50</duration>
                <abstract>This lecture presents an overview of the key EU product directives governing electronic and electrical equipment: the Low Voltage Directive (2014/35/EU), the Electromagnetic Compatibility Directive (2014/30/EU), and the Radio Equipment Directive (2014/53/EU). It outlines their essential requirements, conformity assessment procedures, and the role of harmonised standards in achieving CE marking.
Special attention is given to cybersecurity obligations introduced under the Radio Equipment Directive through Delegated Regulation (EU) 2022/30. The lecture explains how cybersecurity, network protection, and personal data safeguards are now formal compliance requirements for connected and radio-enabled devices, and how these requirements impact design, risk assessment, technical documentation, and lifecycle management.
The session highlights the interaction between electrical safety, EMC, and cybersecurity within a unified compliance strategy for modern electronic products.</abstract>
                <slug>dctf26-25-compliance-of-electronic-products-in-the-eu-from-electrical-safety-and-emc-to-cybersecurity-under-red</slug>
                <track></track>
                
                <persons>
                    <person id='33'>Marko Jankovec</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf26/talk/NZGV7M/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf26/talk/NZGV7M/feedback/</feedback_url>
            </event>
            <event guid='6ffeae90-f233-571a-9bf7-98f577ae5157' id='29'>
                <room>PA</room>
                <title>Zero to RCE in a Weekend: Fuzzing Old Games for Memory Corruption</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-03-21T14:30:00+01:00</date>
                <start>14:30</start>
                <duration>00:25</duration>
                <abstract>Mid-2000s videogames are a great target for finding RCE exploits. They were written in a different era, when things like ASLR and DEP were still seen as useless luxuries that just tank performance. Besides, who is gonna go through the effort to set up a fuzzer for these ancient games?

In this talk we&apos;ll pick a classic 2000&apos;s game, go over the process of fuzzing the game&apos;s server with a very fancy snapshot fuzzer, and fuzzing the client with the dumbest possible bit-flipper I could write in an hour. Both of these approaches lead to bugs that we&apos;ll exploit for remote code execution.</abstract>
                <slug>dctf26-29-zero-to-rce-in-a-weekend-fuzzing-old-games-for-memory-corruption</slug>
                <track></track>
                
                <persons>
                    <person id='36'>Rick de Jager</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf26/talk/PLTQ8Z/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf26/talk/PLTQ8Z/feedback/</feedback_url>
            </event>
            <event guid='bdb4a770-695a-5d27-befc-bc83b64d77db' id='24'>
                <room>PA</room>
                <title>Unfaithful Claims: Breaking 6 zkVMs</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-03-21T15:00:00+01:00</date>
                <start>15:00</start>
                <duration>00:25</duration>
                <abstract>A Zero Knowledge Virtual Machine verifier should be faithful to one thing above all else: its public claims. That is, the proof of a statement should depend on the statement itself. As it turns out, this is not always the case, which can lead to disastrous consequences. In this talk, we will take a journey through six systems where we discovered critical vulnerabilities caused by such issues. Learn how a subtle ordering bug or a tiny omission can let an attacker bypass the cryptography entirely and prove mathematically impossible statements.</abstract>
                <slug>dctf26-24-unfaithful-claims-breaking-6-zkvms</slug>
                <track></track>
                
                <persons>
                    <person id='7'>Andra&#382; Strgar</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf26/talk/9LETXX/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf26/talk/9LETXX/feedback/</feedback_url>
            </event>
            <event guid='6e4c4bbe-b61a-532e-b215-c0323d86b18a' id='27'>
                <room>PA</room>
                <title>Anonymous Credentials for Next-Generation Rate Limiting: From Linear to Constant-Size Issuance</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-03-21T15:30:00+01:00</date>
                <start>15:30</start>
                <duration>00:25</duration>
                <abstract>Anonymous credentials are a critical building block for privacy-preserving systems, from EU digital wallets to privacy-respecting authentication schemes. At the IETF, however, they address efficient rate limiting in the presence of CAPTCHA-based human verification.
Current rate limiting systems use blind signatures or OPRFs to issue batches of rate-limiting tokens post-CAPTCHA. While cryptographically sound, this approach incurs communication complexity linear in the number of tokens issued, a significant bottleneck when handling large token batches.
The talk presents two proposals to reduce the token issuance to constant-size communication regardless of batch size, and shows how to combine them to get parallel, revocable tokens 
The talk will cover the cryptographic foundations, discuss trade-offs between revocation expressiveness and issuance efficiency, and examine deployment challenges. We&apos;ll also explore an interesting secondary application: extending rate limiting to adaptive systems (LLMs, bots) that must solve CAPTCHAs, where the same credential mechanism enables fine-grained behavioral constraints beyond simple token budgets.</abstract>
                <slug>dctf26-27-anonymous-credentials-for-next-generation-rate-limiting-from-linear-to-constant-size-issuance</slug>
                <track></track>
                
                <persons>
                    <person id='34'>Lena Heimberger</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf26/talk/QWPGK3/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf26/talk/QWPGK3/feedback/</feedback_url>
            </event>
            <event guid='549b2c03-ad8e-5fdf-9eb5-ef83266d0025' id='26'>
                <room>PA</room>
                <title>When Correct Code leaks Secrets: Side Channels Explained</title>
                <subtitle></subtitle>
                <type>Lecture</type>
                <date>2026-03-21T16:30:00+01:00</date>
                <start>16:30</start>
                <duration>00:50</duration>
                <abstract>In the real world, computer exploits are often simple: Logic bugs, forgotten bounds checks, or less-adept users typing their passwords into sketchy websites.
But what if we had a world full of flawless code, Rust-only programs, and completely security-aware end users?

Unfortunately, we still would not be secure.
Modern systems leak information in many ways, including performance optimizations or unavoidable limitations in hard- or software.
Execution time, memory access patterns, power usage, and other indirect effects can allow attackers to infer information and extract secrets, even from correctly implemented systems.

In this talk, we look at examples of different attacks exploiting behavior of the CPU architecture, microarchitecture, the Linux kernel code, and common applications that are running on your machine _right now_.
We will see that many side channels are caused by important performance optimizations, making them fundamentally difficult to eliminate.

This talk aims to demystify side channels and give an intuition on how they work, where they appear, and why even &quot;correct&quot; code is not necessarily secure.</abstract>
                <slug>dctf26-26-when-correct-code-leaks-secrets-side-channels-explained</slug>
                <track></track>
                
                <persons>
                    <person id='30'>Hannes Weissteiner</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf26/talk/TNAZ7R/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf26/talk/TNAZ7R/feedback/</feedback_url>
            </event>
            <event guid='3f8a8412-dfe9-500d-a884-0aea4b0a2645' id='31'>
                <room>PA</room>
                <title>How can one do security in a fully modular kernel?</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-03-21T17:30:00+01:00</date>
                <start>17:30</start>
                <duration>00:25</duration>
                <abstract>I mean, let&apos;s be real, a fully modular kernel? sounds awesome, you know what&apos;s not so awesome? Trying to think of a security architecture for it!</abstract>
                <slug>dctf26-31-how-can-one-do-security-in-a-fully-modular-kernel-</slug>
                <track></track>
                
                <persons>
                    <person id='38'>Andra&#382; Rotar</person>
                </persons>
                <language>en</language>
                <description>This talk will cover some of the classic methods of security when it comes to kernels and operating systems, then it will throw those backward ideas out of the window because basically none of them are compatible with my idea of a fully modular kernel! but then you might ask, a fully modular kernel? Well i&apos;ve been working on this &quot;side&quot; project in my free time for quite a while, it&apos;s a custom kernel where (almost) all components of the kernel are loadable modules, that means you can switch out parts of your kernel whenever you want! Which sounds perfectly awesome, but just so happens to be a security nightmare! In any other currently popular operating system allowing any user to load kernel modules is a terrible idea, but maybe it doesn&apos;t have to be in my custom kernel?</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf26/talk/9EU38Y/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf26/talk/9EU38Y/feedback/</feedback_url>
            </event>
            <event guid='0fbee1f0-fc9e-5ffa-ac3b-8afc3af65a2d' id='38'>
                <room>PA</room>
                <title>Capture the Flag in SOC</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-03-21T18:00:00+01:00</date>
                <start>18:00</start>
                <duration>00:25</duration>
                <abstract>What does cybersecurity look like in practice? This lecture shows how Capture the Flag challenges build practical SOC skills, analytical thinking, and teamwork under pressure.</abstract>
                <slug>dctf26-38-capture-the-flag-in-soc</slug>
                <track></track>
                <logo>/media/dctf26/submissions/ULRU9Q/Actual_IT_GROUP_hor_rgb_300dpi_FCY0q42.jpg</logo>
                <persons>
                    <person id='39'>Peter Hutinski</person><person id='40'>Peter Pavkovi&#269;</person><person id='41'>Matic &#352;ebjan Ogrizek</person>
                </persons>
                <language>en</language>
                <description>What does cybersecurity look like in practice? Through the Capture the Flag approach, the lecture will show how threat detection, incident analysis, and finding the right answers under time pressure take place in a SOC environment. Participants will learn why these types of challenges are important for developing practical skills, analytical thinking, and effective teamwork.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.dragonsec.si/dctf26/talk/ULRU9Q/</url>
                <feedback_url>https://cfp.dragonsec.si/dctf26/talk/ULRU9Q/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='2' date='2026-03-22' start='2026-03-22T04:00:00+01:00' end='2026-03-23T03:59:00+01:00'>
        
    </day>
    
</schedule>
