HITBSecConf Amsterdam 2013 April 8, 2013 to April 11, 2013, Amsterdam, Netherlands

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
KEYNOTE 1: Embracing the Uncertainty of Advanced Hacks with Big Data Analytics Edward J. Schwartz N/A Security
Security Response in the Age of Mass Customized Attacks Peleus Uhley , Karthik Raman The goal of mass malware is to successfully run on as many different platforms and ...
Papparazi Over IP Daniel Mende Almost every recent higher class DSLR camera features multiple and complex access technologies. For example, ... Security
Windows x64: The Essentials Didier Stevens In this 120 minute lab session, we will touch upon important differences between 32-bit and ... Security
SSRF PWNs: New Techniques and Stories Vladimir Vorontsov , Alexander Golovko Server request forgery attacks – SSRF (Server Side Request Forgery) has been known since 2008, ...
Orchestrating a Fire Sale: Bringing Dutch Alarm Systems to Their Knees Wilco baan Hofman This will be an in-depth talk about the SIA-HS and Vebon SecIP alarm system protocols ... Security
Nifty Tricks and Sage Advice for Shellcode on Embedded Systems Travis Goodspeed This lecture presents a bunch of clever tricks that will save you time and headaches ... Security
Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel Nikita Tarakanov Each new version of Windows OS Microsoft enhances security by adding security mitigation mechanisms – ... Security
Defending the Enterprise the Russian Way Fyodor Yarochkin , Vladimir borisovich Kropotov , Sergey Soldatov N/A
Defeating the Intercepting Web Proxy – A Glimpse Into the Next Generation of Web Security Tools Petko ( pdp ) D. Petkov This presentation will give information security professionals and enthusiasts an opportunity to explore new tricks ... Security
Virtually Secure: Analysis to Remote Root 0day in an Industry Leading SSL-VPN Appliance Tal Zeltzer Today most networks present one “gateway” to the whole network – The SSL-VPN. A vector ... Security
Page Fault Liberation Army or Better Security Through Creative x86 Trapping Sergey Bratus , Julian Bangert x86 processors contain a surprising amount of built-in memory translation logic, which is driven by ...
LTE Pwnage: Hacking HLR/HSS and MME Core Network Elements Philippe Langlois Phrack and other magazines used to be full of obscure hardware and systems descriptions for ... Security
Hack Like it’s 2013 Itzik Kotler Try to imagine the amount of time and effort it would take you to write ... Security
Aircraft Hacking: Practical Aero Series Hugo Teso This presentation will be a practical demonstration on how to remotely attack and take full ... IncludeThinkstScapes Air Traffic Control Aircraft
Abusing Twitter’s API and OAuth Implementation Nicolas Seriot Since March 2013, Twitter’s new web API requires every request to be signed with OAuth. ... Security
How I Met Your Modem Peter \xe2\x80\x98blasty\xe2\x80\x99 Geissler , Steven Ketelaar The importance of software security and integrity of common embedded devices is still often overlooked ...
Abusing Browser User Interfaces for Fun and Profit Rosario Valotta As social engineering has become the dominant method of malware distribution, browsers makers started to ... Security
Attacking Ruby on Rails Applications Joernchen ( joernchen ) Ruby on Rails (RoR) is an open source web application framework based on the Ruby ... Security
OAuth 2.0 and the Road to XSS Andrey Labunets , Egor Homakov OAuth has recently become a proposed standard for web authorization, intended to solve security issues ...
Who Can Hack a Plug? The Infosec Risks of Charging Electric Cars Ofer Shezaf What could be insecure about charging an electric car? Just plug in to a power ... Security
Swiping Through Modern Security Features Cyril \xe2\x80\x98@pod2g\xe2\x80\x99 , Eric \xe2\x80\x98@musclenerd\xe2\x80\x99 , David \xe2\x80\x98@planetbeing\xe2\x80\x99 Wang , Nikias \xe2\x80\x98@pimskeks\xe2\x80\x99 Bassen he Apple product security team did an impressive job raising the resilience of the iOS ... Exploitation IncludeThinkstScapes iOS Jailbreak
You Can Be Anything You Want to Be: Breaking Through Certified Crypto in Banking Apps Dennis Gamayunov , Andrew Petukhov , George Noseevich It’s no surprise that a typical hackers professional path hits against custom crypto protocols from ...
Secure Coding: Web & Mobile Jim Manico We cannot hack or firewall our way secure. Application programmers need to learn to code ... Security
To Watch or Be Watched: Turning Your Surveillance Camera Against You Sergey Shekyan , Artem Harutyunyan “Doesn’t matter what you see, Or into it what you read, You can do it ...
iNalyzer: No More Blackbox iOS Analysis Chilik Tamir Performing security analysis of iOS applications is a tedious task – there is no source ... Security
Dreamboot: A UEFI Bootkit Sebastien Kaczmarek Unified Extensible Firmware Interface or UEFI, is the result of a common effort from several ... Security
System Shock: The Shodan Computer Search Engine Dan Tentler Heard of the Shodan Computer Search Engine? This young project scans the Internet IPv4 space, ... Security