CanSecWest 2010 March 24, 2010 to March 26, 2010, Vancouver, Canada
Tell us about missing data
Title Speakers Summary Topic Types
Internet Nails Marcus Ranum Beginning the conference was Marcus Ranum, from Tenable Network Security. If you would like to ...
Under The Kimono Of Office Security Engineering David Conger , Tom Gallagher Tom and David from the Microsoft Office team presented that large and coordinated effort Microsoft ...
Seh Overwrite And Its Exploitability Shuichiro Suzuki Shuichiro, who works for Fourteenforty, demonstrated methods to bypass DEP using the Structured Exception handler ...
There'S A Party At Ring0, And Yore Invited Tavis Ormandy , Julien Tinnes Julien and Tavis of Google shared with us the research they have been doing into ...
Babysitting An Army Of Monkeys: An Analysis Of Fuzzing 4 Products With 5 Lines Of Python Charlie Miller Whether you agree with Charlie's philosophy or not, you can always depend on him for ...
Sharereing Is Caring Thomas ( Halvar Flake ) Dullien , Sebastian Porst Halvar and Sebastian are researchers at Zynamics GMBH, founded by Halvar in 2004. They announced ...
Cisco Ios Exploitation With Iodide Andy Davis When he discovered that his employer, KPMG, needed to investigate vulnerabilities in Cisco's IOS-based routers, ...
Random Tales From A Mobile Phone Hacker Collin Mulliner Collin was enthusiastic about his topic and showed how, with a little innovation, you can ...
Legal Perspectives Of Hardware Hacking Jennifer Granick Jennifer is a lawyer for the Electronic Frontier Foundation. Her presentation focused on the legal ...
Stuff We Don'T Want On Our Phones: On Mobile Spyware And Pups Jimmy Shah Jimmy works for McAfee and the heart of his presentation this year was the increasing ...
Practical Exploitation Of Modern Wireless Devices Thorsten Schroeder , Max Moser Thorsten presented their research on wireless keyboards and how to both spy on them and ...
Rfid Hacking At Home Melanie Rieback Dr. Rieback does research on RFID technologies at Vrije Universiteit in Amsterdam, Holland. She demonstrated ...
Advanced Mac Os X Physical Memory Analysis Matthieu Suiche The presentation at CanSecWest focused on new tools he is creating to allow advanced memory ...
Full Process Analysis And Reconstitution Of A Virtual Machine From The Native Host James Butler In the incident response and forensics business, James is a household name. He works for ...
Through The Looking Glass: An Investigation Of Malware Trends And Response Activity Jeff Williams Jeff is the Director of the Microsoft Malware Protection Center. If you are familiar with ...
The Jedi Packet Trick Takes Over The Deathstar: Taking Nic Backdoors To The Next Level Arrigo Triulzi Arrigo presented on his methods for taking over a theoretical firewall running 2 Broadcom NICs ...