HITBSecConf Malaysia 2012 Oct. 8, 2012 to Oct. 11, 2012, KL, Malaysia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Practical Exploitation of Embedded Systems Andrea Barisani , Daniele Bianco N/A Reverse Engineering ExcludeThinkstScapes Attack Embedded
You and Your Research Haroon Meer N/A Security
Tracking Large Scale Botnets Jose Nazario N/A Botnets ExcludeThinkstScapes Defence Network Monitoring
Data Mining a Mountain of Vulnerabili4es Chris Wysopal N/A Statistics ExcludeThinkstScapes
Hackers, The Movie: A Retrospec4ve Don Bailey N/A Security
Don't Stand So Close to Me: An Analysis of the NFC Attack Surface Charlie Miller N/A
6000 Ways and More: A 15 Year Perspective on Why Telcos Keep Getting Hacked Philippe Langlois , Emmanuel Gadaix N/A ExcludeThinkstScapes Attack Mobile Security Network Protocols
Defibrilating Web Security Meder Kydyraliev N/A ExcludeThinkstScapes Defence Java Taint Tracking Ruby
Messing Up the Kids Playground: Eradicating Easy Targets Fyodor Yarochkin , Vladimir borisovich Kropotov N/A Botnets ExcludeThinkstScapes Defence
A Short History of The JavaScript Security Arsenal Petko ( pdp ) D. Petkov N/A
Supercompu4ng, Malware and Correla4on: What a Year in the Life of a MD5 Taught Us Wes Brown N/A Computer Forensics Reverse Engineering Malware ExcludeThinkstScapes
A Historical Look at The Personal Computer and The Phreaking Scene John Draper N/A Security
Data is Poli4cal Peter brokep Sunde , Fredrik famo Neij N/A
iOS6 Security Mark Dowd , Tarjei Mandt N/A
Innovative Approaches to Exploit Delivery Saumil Udayan Shah N/A Exploitation Web Security ExcludeThinkstScapes Attack
Mozilla Apps, Firefox OS and You Lucas Adamski N/A Security
IPv6 Insecurity Revolu4ons Marc Heuse N/A IPv6 ExcludeThinkstScapes Attack
I Honorably Assure You: It is Secure: Hacking in the Far East Paul sebasfan Ziegler N/A Security
Silo Bus4ng in Informa4on Security: The ISC SIE Approach Paul A. Vixie N/A Security
Why Web Security is Fundamentally Broken Jeremiah Grossman N/A Web Security ExcludeThinkstScapes
Behavior--based Methods for Automated, Scalable Malware Analysis Stefano Zanero N/A Reverse Engineering Malware ExcludeThinkstScapes Static Analysis At Scale Dynamic Analysis
How to Get Along with Vendors Without Really Trying Katie Moussouris N/A Introductory IncludeThinkstScapes Standards ISO
Pwn@Home: An ASack Path to Jailbreaking Your Home Router Fredric Raynal , Gabriel Campana N/A
PEDA -- Polishing GDB for Exploit Development Long Le , Thanh Nguyen N/A
XSS & CSRF Strike Back Powered by HTML5 Shreeraj Shah N/A Security
Crypto for the Public Cloud John Viega N/A Security
iOS PANEL DISCUSSION Mark Dowd , David Wang , @musclenerd , Cyril N/A
Finding the Weak Link in Binaries Ollie Whitehouse N/A ExcludeThinkstScapes Windows Static Analysis
OPSEC: Because Jail is for wufpd The Grugq N/A Security
Behind Enemy Lines Mikko Hypponen N/A
A Scien4fic (But Non Academic) Study of Malware Obfusca4on Technologies Rodrigo Rubira Branco N/A Security
Informa4on Warfare & Cyberwar: Whats the Story Morning Glory Raoul "Nobody" Chiesa N/A Cyberwar ExcludeThinkstScapes
Hacking Huawei VRP Felix ( FX ) Lindner N/A Network Penetration ExcludeThinkstScapes Attack Huawei
Element 1337 in the Periodic Table: Pwnium Chris Evans N/A ExcludeThinkstScapes Pwnium Vulnerability Rewards