SysCan 2012 April 26, 2012 to April 27, 2012, Singapore

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening and Welcome Address Thomas Lim N/A Security
Heaps of Doom Chris Valasek , Tarjei Mandt "Windows 8 developer preview was released in September 2011. While many focused on the Metro ... IncludeThinkstScapes Windows 8 Windows 7 Heap Overflows Mitigations
De Mysteriis Dom Jobsivs Loukas The EFI firmware used in Intel Macs and other modern systems presents some interesting possibilities ... Rootkits ExcludeThinkstScapes EFI Mac OS
Owning entire organisations with regional software they've never heard of Ryan Macarthur , Beist "Outsourcing is great right? Cheap labor/First to Market/Exploiting resources are all excellent reasons to set ...
I/O, You own: Regaining control of your disk in the presence of bootkits Aaron Lemasters Master Boot Record based rootkits (MBR rootkits, or bootkits for short)have existed for decades but ... Rootkits Windows 7
Entomology: A Case Study of Rare and Interesting Bugs James Burton N/A ExcludeThinkstScapes
Exploiting the Linux Kernel: Measures and Countermeasures Jon Oberheide Kernels are soft targets. But getting harder. Even the Linux kernel. Ha ha, just kidding. ... ExcludeThinkstScapes Mitigations Linux Kernel PaX grsecurity
ACPI 5.0 Rootkit Attacks Againts Windows 8 Alex Ionescu This talk will disclose certain new features of the ACPI 5.0 Specification which is now ... Rootkits ExcludeThinkstScapes Windows 8 ACPI
iOS Kernel Heap Armageddon Stefan Esser "This talk starts by giving the audience an overview of the different kernel heap allocators ... ExcludeThinkstScapes iOS Heap Overflows
Post Exploitation Process Continuation Brett Moore With the value of 0 day bugs, and the methods to exploit them and bypass ... Buffer Overflows IncludeThinkstScapes Heap Overflows Post Exploitation Use After Free
iOS Applications - Different Developers, Same Mistakes Paul Craig If you live in Singapore and use a mobile banking application on your iPhone or ... IncludeThinkstScapes iOS
Automating the identification of data structures inside binaries Edgar Barbosa The presentation will demonstrate a system able to extract data structure information from binaries using ... IncludeThinkstScapes Code Analysis REIL Z3 N-Gram