BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.gulas.ch//gpn22//XYBWG9
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-gpn22-FSMH9M@cfp.gulas.ch
DTSTART;TZID=CET:20240531T100000
DTEND;TZID=CET:20240531T102000
DESCRIPTION:Nowadays\, many websites rely on user-generated content\, e.g.\
 , by allowing users to upload images\, videos\, documents\, or other files
 . If not handled carefully\, Unrestricted File Uploads (UFUs) may appear a
 nd become a serious security issue.\nOur academic results show that some U
 FU types still fly under the state-of-the-art vulnerability scanners' rada
 rs\, leaving websites at risk of severe vulnerabilities\, such as Remote C
 ode Execution or Cross-Site Scripting. \nThus\, we propose a File Upload E
 xploitation Lab (FUEL) to (em)power vulnerability scanners to become bette
 r at identifying UFUs and invite the community to reFUEL.
DTSTAMP:20240520T164436Z
LOCATION:ZKM Medientheater
SUMMARY:Help Us Identify UFUs: (Em)Powering Vulnerability Scanners with FUE
 L - Sebastian Neef aka gehaxelt\, Moaath
URL:https://cfp.gulas.ch/gpn22/talk/FSMH9M/
END:VEVENT
END:VCALENDAR
