HITBSecConf Malaysia 2013 Oct. 14, 2013 to Oct. 17, 2013, Kuala Lumpur,Malaysia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Diving Into IE 10?s Enhanced Protected Mode Sandbox Mark Vincent Yason
Hacking Corporations Using Unconventional Chained Exploits N/a This presentation will cover several examples of unconventional chained exploits used in real-world penetration tests; ...
20 Ways to Secure Boot Job de Haas This talk presents an overview of all things that can go wrong when developers attempt ...
Digging Deeper into Aviation Security Hugo Teso Still focusing on the same target, aircrafts, this presentation we will detail and exploit new ...
TraceDroid: A Fast and Complete Android Method Tracer Victor Veen Recent reports show that Android is responsible for 92% of all known mobile malware. From ...
Facebook OSINT: It’s Faster Than Speed Dating Keith Lee , Jonathan Werrett The Facebook Graph has been a boom for Open Source Intel (OSINT). Since being released ...
TCP Idle Scans in IPv6 N/a With the slowly approaching upgrade of IPv4 with IPv6, one will not be able anymore ...
Cracking and Analyzing Apple’s iCloud Protocols Vladimir Katalov Apple’s iCloud was meant to provide ease of use and peace of mind should your ...
Demystifying Game Console Security: Over 10 Years of Ownage Unraveled Peter ‘@bl4sty’ Geissler Are you interested to learn about the delicate hacks and tricks that go on behind ...
KEYNOTE 2 – Bringing Social to Security Joe Sullivan Joe talked at HITB 2011 (Amsterdam) about the importance of security teams innovating constantly to ...
Sending Out An SOS: Session Origin Security Mike Shema Cross Site Request Forgery (CSRF) remains a significant threat to web apps and user data. ...
RFIDler: A Software Defined RFID Reader/Writer/Emulator Adam ( Major Malfunction ) Laurie Software Defined Radio has been quietly revolutionising the world of RF. However, the same revolution ...
Defeating Signed BIOS Enforcement Xeno Kovah , Corey Kallenberg , John Butterworth The integrity of the BIOS is paramount to the security of the platform. Research such ...
Owning a Cisco VOIP Environment: Exploiting the Call Manager Francisco Cisco VOIP environments are widely deployed. In this presentation we will demonstrate how it is ... IncludeThinkstScapes
SHAttered Dreams Joshua ‘@p0sixninja’ Hill WIn the past 5 years, since Apple has unleashed the iPhone to the world, there ...
Using Visualization to Analyze Malware Wes Brown Last year’s Supercomputing and Malware talk had visualizations that showed diagrams of relationships between hosts ...
Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions Andy Davis Embedded systems are everywhere, from TVs to aircraft, printers to weapon control systems. As a ...
Practical Attacks Against Encrypted VoIP Communications Dominic Chell , Shaun Colley Due to the often-sensitive nature of VoIP calls, it is well understood that packets in ... IncludeThinkstScapes
Using Online Activity as Digital DNA to Create a Better Spear Phisher Joaquim Espinhara , Ulisses Albuquerque Every day we produce tons of digital breadcrumbs through our activities in online services – ...
Android DDI: Dynamic Dalvik Instrumentation of Android Applications and Framework Collin Mulliner As application security becomes more important on Android we need better tools to analyze and ... IncludeThinkstScapes
Hunting for OS X Rootkits in Memory Cem Gurkok The OS X Kernel has been increasingly targeted by malicious players due to the shrinking ...
Under the Hood: How Actaeon Unveils Your Hypervisor Mariano Graziano , Andrea Lanzi In recent years virtualization has become really popular and used everywhere, in the domestic installations ...
Hey Captain, Where’s Your Ship? Attacking Vessel Tracking Systems for Fun and Profit Marco Balduzzi , Kyle Wihoit , Alessandro Pasta In recent years, automated identification systems (AISes) have been introduced to enhance vessels tracking and ...
KEYNOTE 1 – Cognitive Injection: Reprogramming the Situation-Oriented Human OS Andy Ellis It’s a trope among security professionals that other humans – mere mundanes – don’t “get” ...
Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis Rahul Sasi With the rise in number of targeted attacks against government and private companies, there is ...
How Apple Can Read Your iMessages and How You Can Prevent It Cyril ‘@pod2g’ , Gg Apple’s Commitment to Customer Privacy is available online since the brand appeared in the PRISM ...
Trusted Friend Attack: When Guardian Angels Strike Ashar Javad In this paper, we survey “forgot your password” functionality of fifty popular social networks and ...
Tales from iOS 6 Exploitation and iOS 7 Security Changes Stefan Esser During SyScan Singapore 2013 lots of innocent iOS vulnerabilities have been murdered. However one of ...
The Forger’s Art: Exploiting XML Digital Signature Implementations James Forshaw Many security critical systems rely on the correct implementation of the XML Digital Signature standard ...
Thawting Evil Maid Attacks: Physically Unclonable Functions for Hardware Tamper Detection Ryan Lackey , Eric Michaud Increasingly, users and their computing hardware are exposed a range of software and hardware attacks, ...
Tracking and Characterizing Botnets Using Automatically Generated Domains Stefano Zanero Modern botnets rely on domain-generation algorithms (DGAs) to build resilient command-and-control infrastructures that are difficult ...
Lost in Translation Luiz 'effffn' Eduardo , Joaquim Espinhara We all know, English has been the universal language for several years now. Companies have ...