HackLu 2011 Sept. 19, 2011 to Sept. 21, 2011, Luxembourg,Luxembourg

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote - Human After All Pierre-marc Bureau To properly understand malware, it is crucial to understand the motivations and tactics of malware ...
Security Problems in operational navy systems, Industrial point of view Patrick Hebrard , Laurent Comte Most of navy systems (on a battleship or navy base operational centre) integrate harware/software civilian ...
Steal Everything, Kill Everyone, Cause Total Financial Ruin." (Or how I walked in & misbehaved) Jayson E. Street This is not a presentation where I talk about how I would get in or ...
Fruit: Why You So Low? Metlstorm New Zealand exports a lot of things; milk products, tasty tasty lamb, and the eponymous ...
Project Ubertooth: Building a Better Bluetooth Adapter Michael Ossmann The off-the-shelf Bluetooth adapters didn't do what I wanted, so I built my own. This ...
Chip & PIN is definitely broken Andrea Barisani , Daniele Bianco The EMV global standard for electronic payments is widely used for inter-operation between chip equipped ...
Milking the Internet: case studies of emerging cybercrime threats Fyodor Yarochkin This presentation will cover emerging internet threats and explore the financial motives and mechanisms behind ...
Extending Scapy by a GSM Air Interface and Validating the implementation Using Classical and Novel Attacks Laurent 'kabel' Weber This presentation describes the enhancement of scapy, the powerful interactive packet manipulation program, by the ...
Abusing the Windows WiFi native API to create a Covert Channel Ezequiel D. Gutesman , Andres Blanco Communications over wireless channels have been perfectioned in the last years mainly improving performance and ...
Locating a GSM phone in a given area without user consent. Iosif Androulidakis Is it possible to locate a GSM phone in a given area without alerting its ...
On the Secure Software Development in Early Stages within UML Profiles Ricardo J. Rodrguez Security deals with confidentiality, authorisation, authentication, availability and integrity non-functional properties (NFPs). Unfortunately, security modelling ...
Linux thread injection - The jugaad way Aseem "@" Jakhar Windows malware conveniently uses the CreateRemoteThread() api to delegate critical tasks inside of other processes. ...
SniffJoke project Claudio Agosti A sniffer or a NIDS works collecting passively internet traffic. This traffic is grabbed as ...
Lockpicking Talk Walter Belgers N/A
How Visualization makes it possible Sebastien Tricaud Handling huge amount of data is difficult. Organizations have been deploying Firewall, SIEMS, log management ...
OAuth and OpenID - Securing the Insecure Khash Kiani There are a number of open protocol and standards designed to deliver mechanisms for enabling ...
Weaponizing the Smartphone: Deploying the Perfect WMD Kizz Myanthia The acceptance and integration of mobile phones, specifically smartphones, into our everyday life has allowed ...
Critical infrastructure, a weapon of mass destruction? Francois Gaspard , Fred Raynal PLC, DCS, OPC, SCADA, Modbus, Stuxnet, we all hear about these terms quite often nowadays. ...
Results of a Security Assessment of the Internet Protocol version 6 (IPv6) Fernando Gont The IPv6 protocol suite was designed to accommodate the present and future growth of the ...
The ArDrone corruption Eddy Deligne , Olivier Ferrand The goal of the demonstration is to corrupt, both the communication canal UAV/pilot, and the ...
Rootkits and Trojans on Your SAP Landscape Ertunga Arsal SAP systems are the heart of many enterprises. Most critical business functions run on SAP ...
Scaling up DoS: taking out your mobile phone, bank and internetz Philippe Langlois Founder of P1 Security and Senior Researcher for Telecom Security Task Force. Philippe Langlois has ...