44Con 2013 Sept. 12, 2013 to Sept. 13, 2013, London,UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Evading Identification and Detection by Messing with Binary Formats Ange ( ange4771 ) Albertini Malwares and exploits rely on many different file formats. It’s critical for security softwares to ...
A talk about (info-sec) talks Haroon Meer Last year there was an Information Security conference taking place for almost every day of ...
Surviving the 0-day - Reducing the Window of Exposure Andreas Lindh According to the NIST National Vulnerability Database, 1772 software vulnerabilities with a CVSS score of ...
Breaking Bad Programs Don a. Bailey Offensive tactics against executable code have traditionally been measured in repeatable predictable steps. This is ...
A Fast Hard Disk with Active Antiforensics Travis Goodspeed When a computer reads from a hard disk, it is actually speaking over the bus ...
Punking Punkbuster Isaac Dawson This presentation will cover the methods and process used while trying to understand how PunkBuster ...
Security Lessons from Dictators Jerry Gamblin What do the Grand Ayatollah Seyyed Ali Hosseini Khamenei, Kim Jong-un, Julius Caesar, Abraham Lincoln, ...
.Net Havoc - Manipulating Properties of Dormant Server Side Web Controls Shay Chen Most modern web application frameworks use Server-Side Web Controls to enhance the development process; components ...
The Forger's Art: Exploiting XML Digital Signature Implementations James Forshaw Many security critical systems rely on the correct implementation of the XML Digital Signature standard ...
A Captive Audience Jaime Cochran In modern societies we perceive prisons and jails as places where well deserving citizens endlessly ...
Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware Patrick Stewin In this work we present a stealthy malware that exploits dedicated hardware on the target ...
I miss LSD Tim Brown A wise man once said (paraphrased) “if you want to find UNIX bugs, compare and ...
Building Antibodies - The Phishing program at Twitter. Dan Tentler I run the internal phishing program at Twitter. It was built from scratch and uses ...
Best Practices and the Future of Adaptive Authentication Robert Weiss , Ben Gatti The talk is a deep-dive into the details of authentication focused on best practices and ...
Even More Tamagotchis Were Harmed in the Making of this Presentation Natalie Silvanovich You might remember Tamagotchi virtual pets from the 1990’s. These toys are still around and ...
My quest into FM-RDS Oona Räisänen This talk will concentrate on my experiences with FM-RDS (Radio Data System), a digital subcarrier ...
Reversing and Exploiting BT CPE Devices Zachary Cutlip In this talk I’ll describe the process by which I reverse engineered the firmware for ...
Signatureless Breach Detection Under The Microscope Olli-pekka Niemi , Antti Levomäki Signatureless attack detection is becoming the hot topic in threat prevention. Client side security vulnerabilities ...
Browser bug hunting - Memoirs of a last man standing Atte Kettunen Just like drinking is not a game in Finland; neither is browser bug hunting - ...
Honey I'm Home!! - Hacking Z-Wave Home Automation Systems. Behrang Fouladi , Sahand Ghanoun “Smart homes” employing a variety of home automation systems are becoming increasingly common. Heating, ventilation, ...
Reverse Engineering with HackRF Michael Ossmann Software Defined Radio (SDR) has given us an unprecedented ability to perform over-the-air reverse engineering ...