Alexander Pirker
Senior Security Consultant
Actions
Alexander works as a Senior Security Consultant. In his daily work, he performs security audits including penetration testing and security reviews, holds secure coding workshops, and also gives trainings and provides consulting services for software design and architecture. He has experience several years of experience in designing microservices and desktop or mobile applications and also in writing or migrating them. He received a PhD in Physics from the University of Innsbruck and holds master’s degrees in both Technical Mathematics and Biomedical Informatics.
Links
Going Quantum: The future of the internet ...
Quantum computers unleash a tremendous excitement in all of us. The problems they solve, and the performance they promise open a new era for computing. But what about taking these thoughts a step further, towards quantum networks, or even a global quantum internet? Is there even more to discover?
In this session I shed light into the world of quantum from a developers perspective. I start with a brief recap of quantum computing to set the stage. Then I introduce you to entanglement, one of the keys to quantum networks. Entanglement lies at the heart of the most exciting applications for quantum computers, like quantum secret sharing, quantum key agreement or distributed quantum computing. Next I discuss how quantum networks look like, how they work, and especially what they offer to us. Finally, I point out the open problems we are facing on building them, and how we as engineers can help and contribute to create the quantum internet.
101 Typical Security Pitfalls
Have you ever wondered about how it comes to security incidents? I mean the really big ones like someone accessing a remote host, or executing some nice scripts inside your browser?
In this session I want to show some of the most common pitfalls into which especially junior developers fall. Specifically, I want to cover the following frequent mistakes, and more:
* Missing Input Data Validation: Certainly a big one, since depending on the environment, this could lead to for example remote-code-execution (RCE) on your backend, or the execution of scripts in your browser, known under the term XSS
* Improper Usage of Data Types: One of my favorites, since it highlights how careless we sometimes use data types without reasoning about the consequences of our choices.
* Revocation processes: Unfortunately, as developers we build a system to run in a happy world, most of the time. But how do you deal with the revocation of a malicious entity?
* Denial-of-Service through service crashes
WeAreDevelopers World Congress 2023 Sessionize Event
WeAreDevelopers World Congress 2022 Sessionize Event
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top