Breakpoint 2013 Oct. 26, 2013 to Oct. 27, 2013, Melbourne, Austrailia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
BIOS Chronomancy John Butterworth In 2011 the National Institute of Standard and Technology (NIST) released a draft of special ...
The Forger's Art: Exploiting XML Digital Signature Implementations James Forshaw Many security critical systems rely on the correct implementation of the XML Digital Signature standard ...
LOBO: Scalable Covert Malware Analysis Danny Quist Dynamic malware analysis is a well rounded field that suffers from known problems: Analysis is ...
APT1: Technical Backstage Paul Rascagneres Earlier this year Mandiant published a report about an alleged state-sponsored Chinese hacking group nicknamed ...
Hot-Wiring of the Future: Exploring Car CAN Buses! Grayson Zulauf , Ted Sumers To the layperson, a car is a primarily mechanical system—an internal combustion engine linked to ...
A Whirlwind Tour of Academic Techniques for Real-World Security Researchers Silvio Cesare This talk will discuss some of the academic tools and techniques discovered and implemented whilst ...
Bypassing All of the Things Aaron Portnoy This presentation is intended to give the viewer insight into an approach to the vulnerability ...
The Mathematics of Wonton Burrito Meals Snare Memory forensics is a bit of a big deal these days and there are some ...
Advanced iOS Kernel Debugging for Exploit Developers Stefan Esser With the release of iOS 6 Apple has raised the bar for iOS kernel exploit ...
A Tale of Two Androids Jon Oberheide N/A
The Political Economy of the Cyber-security and Malware Markets Michael Sulmeyer When governments and their national-security bureaucracies consider the acquisition of new tools or capabilities, these ...
Hacking, Surveilling, and Deceiving victims on Smart TV Seungjin Lee Smart TVs sold over 80,000,000 units around the world in 2012. This next generation "smart" ...
Building Antibodies - The Phishing program at Twitter Dan Tentler I run the internal phishing program at Twitter. It was built from scratch and uses ...
Hard disks: More than just block devices Jeroen Domburg Hardware Reverse Engineering IncludeThinkstScapes