44con 2016 Sept. 14, 2016 to Sept. 16, 2016, london,uk

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Three Decades In Security. What's Changed, And What Hasn't Robert Schifreen N/A
Frictionless Security Jerry Gamblin N/A
Light at the end of the tunnel. (Hope for team Defence) Haroon Meer N/A
What it means to have the C word in the National Security agenda Emil Tan N/A
Not only frogs can hop Daniel Compton N/A
Vehicle Cyber Security and innovative assessment techniques Andy Davis , David Clare N/A
ARM Shellcode Basics Saumil Udayan Shah N/A
Jittery MacGyver: Lessons Learned from Building a Bionic Hand out of a Coffee Maker Evan "treefort" Booth N/A
Attacks on SAP HANA platform Juan Perez-etchegoyen , Nahuel Sanchez N/A
Web application Firewalls: Advanced analysis of detection logic Vladimir Ivanov N/A
Managing Incidents with CyberCPR Steve Armstrong N/A
The Frugal Girl’s Guide to Threat Intelligence Rebekah Brown N/A
Leverage One-shot UAF to a Minigun G Wen N/A
IMSecure - Attacking VoLTE Hendrik Schmidt , Brian Butterly N/A
2016: The Infosec Crossroads Saumil Udayan Shah N/A
Effortless, Agentless Breach Detection in the Enterprise: Token all the Things! Azhar Desai , Nicholas Rohrbeck N/A
Evening Session: Graham Sutherland - Saving Nostalgia: Modding an old Z80 computer Graham Sutherland N/A
Evening Session: Rogan Dawes & Dominic White - Universal Serial aBUSe: Remote physical access attacks Dominic White , Rogan Dawes N/A
Data protection, privacy and cloud computing: navigating legal compliance Graham Mckay N/A
Advanced Incident Remediation Techniques Steve Armstrong N/A
Bootstrapping an Architectural Research Platform Jacob Torrey N/A
Look Mum, I don't use Shellcode: Browser Exploitation Case Study for Internet Explorer 11 Moritz Jodeit N/A
Hunting Linux Malware for Fun and $flags Olivier Bilodeau , M. M. Léveillé N/A
101 ways to brick your hardware Joe Fitzpatrick N/A
The Malware CAPE: Automated Extraction of Configuration and Payloads from Sophisticated Malware Kevin O’reilly N/A
Exploiting COF vulnerabilities in the Linux kernel Vitaly Nikolenko N/A
Advanced Java Application Code Review Philippe Arteau N/A
Trusts You Might Have Missed Will Schroeder N/A