BlueHat 2007 Oct. 14, 2007 to Oct. 15, 2007, Redmond, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Cellular Safety! Sean Hunt The growth of cellular and mobile technologies has expanded at phenomenal rates over the past ... Security
Wabisabilabi: The Exploit Marketplace Project Roberto Preatoni Three days after its launch, the Wabisabilabi project attracted the world's attention. For the good ... Security
Malware, Isolation And Security Boundaries: Itís Harder Than It Looks Mark Russinovich Just about everyone thinks they know the solution to the malware problem, whether it is ... Security
Automated Application Security Testing Models With Cool Wpf Visualizations Shane ( K2 ) Macaulay This talk demonstrates security visualization at the systems layer to depict an instrumented application context. ... Security
Microsoftís Circle Of Life: Patch To Exploit Lurene ( pusscat ) Grenier This talk will outline a simple, repeatable procedure for turning Microsoft Tuesday patch releases into ... Security
Black Ops 2007: Dns Rebinding Attacks Dan Kaminsky Part of the design of the web allows browsers to collect and render resources across ... Security
Office 0-Days And The People Who Love Them! Robert Hensing In 2006, MSRC received an unprecedented number of vulnerability reports for Office 2003. Some of ... Security
Subverting Windows Ce Kernel For Fun And Profit Petr Matousek In this talk, the author presents various ways to subvert Windows CE kernel to hide ... Security
Structural Classification Of Malware Thomas ( Halvar Flake ) Dullien Malware authors are changing. In the past, their motivation was fame, nowadays it is mostly ... Security
Mobile And Embedded Security - The Elephant Under The Carpet Ollie Whitehouse Ollie Whitehouse from Symantec will present a matter-of-fact look at Windows Mobile 5 & 6 ... Security
An External Perspective To Extending Microsoftís Phoenix Framework Matt Miller An understanding of Microsoft's Phoenix framework will soon be a requirement for those involved in ... Security
Fuzzing Sucks! Pedram Amini , Aaron Portnoy Face it, fuzzing sucks. Even the most expensive commercial fuzzing suites leave much to be ... Security
Death By 1,000 Cuts Robert ( Rsnake ) Hansen Web application security is the new security frontier. Firewalls, IDSs, and IPSs have become all ... Security
Emerging Mobile Security Problems, Or How We Learned To Stop Worrying And Love Windows Mobile Kevin Mahaffey , John Hering Mobile devices have become a valuable attack target: they store sensitive information, perform financial transactions, ... Security
Your Tamper-Resistant Hardware Makes A Great Sport For Hackers Andrew ( bunnie ) Huang The worst way to keep a secret is to copy it a million times and ... Security
Your Underground Vulnerability Economy Rob Thomas This talk discusses the underground economy, the engine that fuels and is fueled by the ... Security
Security Trade-Offs And Pitfalls In Virtualized Platforms Jeff ( Rain Forrest Puppy ) Forristal Depending on who you ask, platform virtualization (a la Virtual Server, VMWare, Xen) is useful, ... Security
Breaking And Breaking Into Microsoft Security Tools David Maynor , Robert Graham Ever read a story about a remote code execution vulnerability in an AV vendor and ... Security