SOURCEDublin 2013 March 23, 2013 to March 24, 2013, Dublin,Ireland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Trail Of Bits Vincenzo Iozzo N/A
Keynote: Halvar Flake N/A
Games We Play: Payoffs & Chaos Monkeys Allison Miller Game theory is a technique for modeling system behavior, given different potential scenarios and the ...
Data Correlation - Why keep this valuable information in a corner? Xavier Mertens There are tons of security tools that can be deployed in networks. Usually they address ...
Dude, Where’s My Laptop? Simon Roses Femerling Dozens of security solutions from well-known antivirus houses, hardware vendors, ISV and single developers have ...
Big Data Security: Emerging Threats And How To Prevent The Davi Ottenheimer N/A
The Realex Payments Application Security story, narrated by Security Ninja David Rook This talk will tell the story of how one financial services company built and developed ...
Lessons Of Static Binary Analysis Christien ( Dildog ) Rioux "Ever wanted to know more about how static binary analysis works? It's complicated. Ever want ... Security
Android application reverse engineering & defenses Patrick Schulz , Felix Matenaar As the Android platform uptake continuously increases, so does the need for robust Android application ...
Those who cannot learn from history are doomed to repeat it Brian Honan Security breaches are becoming a regular occurrence with many creating headlines. Yet, despite this publicity ...
SQL Post-Exploitation - Database Driven Attack Methodology Rob Whitey Beck "This talk covers attack methodologies that harness the Microsoft SQL Server platform as the basis ...
Hacking Appliances: Ironic exploits in security products Ben It is tempting to think of security appliances as somehow fortified; i.e. specially secured and ... Security
Monkeyherd: Stay fuzzy, my friends Peter Morgan , John Villami We will showcase Monkeyherd, a distributed fuzzing framework complete with GUI automation, code coverage analytics ...