HITBSecConf Malaysia 2010 Oct. 11, 2010 to Oct. 14, 2010, Kuala Lampur, Malaysia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Iphone Security Model And Vulnerabilities Cedric Halbronn iPhone Security Model and VulnerabilitiesPresentation AbstractThe mobile world keeps growing. Among actors, the iPhone is ... Security Web Access Exploitation Analysis Browser
Virtually Pwned – Pentesting Vmware Claudio Criscione Virtually Pwned – Pentesting VMWarePresentation AbstractVirtualization systems are nowadays ubiquitous in enterprises of any size. ... Security Web Analysis Testing
Resilient Botnet Command And Control With Tor Dennis Brown Resilient Botnet Command and Control with TorPresentation AbstractBotnets pose a danger to all computer users ... Security Monitoring Analysis Malware Botnets
Micro Control Don Bailey Micro ControlPresentation AbstractWith the growing popularity of hardware hacking, researchers are becoming more aware of ... Security Wireless Risk
Breaking Virtualization By Any Means Jonathan ( Endrazine ) Brossard Breaking Virtualization by Any MeansPresentation AbstractIn the last 5 years, virtualization software have been massively ... Security Fuzzing Risk Auditing
Analyzing Massive Web Attacks Laurent Oudot Analyzing Massive Web AttacksPresentation AbstractThe goal of this talk is to have a deep look ... Security Web
Payload Already Inside: Data Re-Use For Rop Exploits Long Le Payload Already Inside: Data Re-Use for ROP ExploitsPresentation AbstractReturn-oriented programming (ROP) is one of the ... Security Web Exploitation Analysis
Cache On Delivery Marco Slaviero Cache on DeliveryPresentation AbstractCloud services continue to proliferate and new users continue to flock, in ... Security Web Exploitation Cloud
Milking A Horse Or Executing Remote Code In Modern Java Web Frameworks Meder Kydyraliev Milking a Horse or Executing Remote Code in Modern Java Web FrameworksPresentation AbstractIf you thought ... Security Web
Smartphones, Applications & Security Paul Sebastian Ziegler Smartphones, Applications & SecurityPresentation Abstract10 years ago, “phone hacking” meant “hacking with your phone” to ... Security Access Malware
Exploit Delivery Saumil Udayan Shah Exploit DeliveryPresentation AbstractIt has been a decade since I started talking about computer security. 10 ... Security Web Browser
Detecting Hardware Keyloggers Fabian Mihailowitsch Hardware keyloggers are tiny devices that are plugged between a computer keyboard and a computer. ... Hardware General
Attacking Sap Users Using Sapsploit Extended Alexander mikhailovich Polyakov SAP security is becoming a popular topic and clientside security of ERP systems is not ... Security Business
Lessons Learned From Mariposa: Avoiding Disaster – Protecting From Cybercrime Luis Corrons The recent takedown of the Mariposa botnet, the largest recorded in history, brought cybercrime awareness ... Security Malware
Fuzzing The Rtl Mary Yeoh Have you ever thought of how to predict and prevent attacks on your design? The ... Fuzzing
Remote Binary Planting – An Overlooked Vulnerability Affair Mitja Kolsek The binary planting vulnerability, although documented for over a decade, remained overlooked by researchers and ... Exploitation
Can You Trust Your Workers? Examining The Security Of Html5 Web Workers Paul Theriault The Web Worker specification brings thread-like behaviour to web pages, allowing web pages to run ... Security Business
Lessons Learned From Mariposa: Avoiding Disaster – Protecting From Cybercrime Sean-paul Correll The recent takedown of the Mariposa botnet, the largest recorded in history, brought cybercrime awareness ... Security
Hacking A Browser’S Dom – Exploiting Ajax And Ria Shreeraj Shah Web 2.0 applications are using dynamic DOM manipulations extensively for presenting JSON or XML streams ... Web Security
Payload Already Inside: Data Re-Use For Rop Exploits Long Le , Thanh Nguyen Return-oriented programming (ROP) is one of the buzzing advanced exploitation techniques these days to bypass ... Exploitation
Attacking Gsm Base Stations And Mobile Phone Basebands The Grugq Recent technological advances have placed GSM tools within the reach of today’s security researchers and ... Mobile Security Security