SourceBoston 2013 April 16, 2013 to April 18, 2013, Boston,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Games We Play: Payoffs & Chaos Monkeys Allison Miller Game theory is a technique for modeling system behavior, given different potential scenarios and the ...
Inside the Black Hole Exploit Kit (BHEK) Chester Wisniewski One of the most successful drive-by attack toolkits available to criminals, Black Hole, is dominating ...
Bring Your Own Device: Keeping it Simple and Effective Andrew Jaquith Bring-Your-Own-Device (BYOD) has gained favor with companies: 94% will allow employees to bring their own ...
Attacking Cloud Services with Source Code Jonathan Claudius It is a lot of work to ensure that an open source project runs the ...
JavaScript Pitfalls Ming Chow This presentation will cover both offensive and defensive JavaScript programming techniques including what JavaScript developers ...
The Base Rate Fallacy: Information Security Needs To Understand This. Patrick Florer A base rate is the prevalence of an item of interest in a population. In ...
Theory and Application of Realistic Capture the Flag Competitions Julian Cohen Capture The Flag is a type of offensive competition where teams solve security challenges to ... Security
Third Party Security Assurance: The Service Provider Perspective John Nye "For enterprises and their service providers alike, due-diligence efforts have become expensive and un-enlightening. It's ...
Distributed Security: Expanding the Toolkit for Institutional Resilience Sam Curry , Sandy Carielli It has become almost trite to say that institutions must operate on the assumption that ...
Birds, bots and machines - Fraud in Twitter and how to detect it using Machine Learning Techniques Vicente Diaz Summarizing the main points of this presentation: - Analysis of real malicious campaigns on Twitter ...
Analyzing the Chemistry of Data Wendy Nather Data security doesn't involve just securing data at rest or in transit. It also needs ...
Hooked on Packets: Reading Pcaps for D students Ryan Linn , Mike Ryan "Understanding what's going on with a network is a critical skill for security professionals, sys ...
Protecting sensitive information on iOS devices David Schuetz "This talk reviews the key technologies available to keep data protected on iStuff, hopefully framing ...
Punch and Counter-punch with .Net Apps J wolfgang Goerlich Alice wants to send a message to Bob. Not on our network, she won’t! Who ...
Big Data? Big Liability! Jake Kouns Companies that embrace “big data” may not realize that they are also opening up the ...
"Hacking Back" is a Bad Idea Steven Maske Recently there has been a lot of discussion around responding to attacks by "hacking back". ... Security
No-Knowledge Crypto Attacks Dan Crowley The strength of a cryptographic system does not depend solely on the strength of the ...
Data Analysis and Visualization for Security Professionals Bob Rudis , Jay Jacobs You have a deluge of security-related data coming from all directions and may even have ...
Adversarial Decision Making in Critical Infrastructure Cyberattacks Aunshul Rege This talk investigates technical and non-technical factors that influence adversarial decision-making (ADM) in critical infrastructure ...
Blitzing with your Defense Ben Jackson The traditional response model for blue teams, designed with years of experience with virus and ...
HTTP Header Hunting - A Behavioral Approach to Malware Detection Jonathan Claudius , Rodrigo Montoro A large percentage of malware today uses HTTP/HTTPS as it’s call back mechanism. These call ...
Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics) Andrew Hay In this session, CloudPassage Chief Evangelist Andrew Hay will address the forensic and IR challenges ...
Attacking NFC Mobile Wallets: Where Trust Breaks Down Max Sobell "This talk covers the attack surface of NFC Mobile Wallets (including Google Wallet) and details ...
Building Your Own Packet Capture Platform Mike Kershaw , Mike Ossman "Building your own hardware for packet capture is easier than you mightthink. New resources for ...
Suicide Risk Assessment and Intervention Tactics Amber Baldet Suicide is the 10th leading cause of death in the United States, yet it persists ... Security
I Built My House On Sand - Embedded Security at the Firmware Layer Ryan Permeh "Embedded systems are pervasive in our lives. They run millions of systems that hide behind ... Security
We See The Future And It's Not Pretty Chris Wysopal We all know that applications are inherently insecure, yet some of the highest profile breaches ...
Kinetic Pwnage: Obliterating the Line Between Computers and the Physical World Ed Skoudis "The infosec industry has spent decades struggling to secure computers and the vital data they ... Security
"Cyber" Momentum: Understanding & Leveraging the National Cybersecurity Policy Debate Jack Whitsitt As the national dialogue on cybersecurity and critical infrastructure reaches a fevered and occasionally irrational ... Security
Pwnie Express presents Practical MitM Pentesting Jonathan Cran "With the explosion of small embedded devices, your internal network just got turned into a ... Security
Insider Threat: Hunting for Authorized Evil Tom ( Decius ) Cross The prevalence of Insider Threat is often a subject of disagreement and unsourced statistical assertions. ... Security
Strategic Analysis of the iOS Jailbreak Development Community Dino Dai Zovi "Attackers, just like defenders, are resource-constrained. The choices of where to look for exploitable vulnerabilities ... Android Analysis IncludeThinkstScapes iOS Jailbreak
An Examination of String Allocations in Internet Explorer 9 Christopher Valasek Allocation of memory, specifically user‐controlled strings, has played a major role in browser exploitation, especially ... Security
A Brief History of Physical Security Schuyler Towne "This talk will take you from the door seals of ancient Mesopotamia to the proving ... Security
Practical Exploitation of Embedded Systems Andrea Barisani The presentation covers some exotic challenges arising from the in-depth exploration of the reverse engineering ...
Hiring/Recruitment Lee Kushner "The need for information security talent is increasing. Bright, passionate, information security professionals have a ... Security
Analysis of The BroBot DDOS Attack Eric Kobrin , Akamai His presentation will provide an analysis of the use of BroBots to launch DDOS attacks, ...
Speed Networking Jonathan Cran "Think all of the good talent has left Boston? Think again. This session is a ... Security
Keynote Gene H. Kim N/A Security
Fireside Chat Richard Thieme , Dan Geer , Josh Corman Join us as we listen to industry luminaries, Dan Geer and Richard Thieme discuss industry ...