HITBMalaysia 2011 Oct. 12, 2011 to Oct. 12, 2011, Kuala Lam Pur,Malaysia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
KEYNOTE 1: Is The Pen Sll Migher Than The Sword? Kenneth Geers In ancient Greece, Euripides warned that the tongue was sharper than the blade. In the ...
Satellite Telephony Security: What is and What Will Never Be Jim Geovedi This talk will provide an in-depth treatment of satellite telephony networks from a security perspective. ...
Building and Breaking Ruby on Rails Joernchen ( joernchen ) Ruby on Rails (RoR) is an open source web application framework based on the Ruby ...
Post Memory Corruption Analysis Jonathan Brossard In this presentation, we introduce a new exploitation methodology of invalid memory reads and writes, ...
SAPocalypse Now: Crushing SAP’s J2EE Engine Alexander mikhailovich Polyakov , Dimitry chastuhin Having had great success with the first part of our research “A crushing blow at ...
Compiling Features for Malicious Binaries Muhammad zabidi Malware infects a host with exploiting known and unknown vulnerabilities. Among the list of current ...
GoodFUN: Integrating Hardware Protocol Scanning Support in GoodFET Don a. Bailey The GoodFET, designed by Travis Goodspeed, is an open source JTAG adapter. Its primary job ...
VoIP - AXacking CUCM Joffrey Czarny , Sandro Gauci We’re going to cover different signaling protocols and how one can scan for them. The ...
Reverse Engineering Android Malware Mahmud ab Rahman Android is growing at such an explosive rate, and users are storing an increasing amount ...
Fun with JavaScript DeObfuscation Mahmud ab Rahman , Adnan mohd shukor It is the norm to have JavaScript code within exploits on malicious web, PDFs and ...
Mobile Malware Analysis Alex Kirk Mobile malware is becoming a larger concern every day, as the proliferation of smartphones continues ...
All Your Base Stations are Belong to Us: Extending Scapy with a GSM Air Interface Laurent 'kabel' Weber This presentation describes the enhancement of scapy, the powerful interactive packet manipulation program, by the ...
Attacking the Privacy of Social Network Users Marco ‘embyte’ Balduzzi Social networks are some of the largest and fastest growing online services today. Facebook, for ...
Packets in the Dark - Pwning a 4G Device for the Lulz Biatch0 , Rufi0 This talk will disclose weaknesses in a 4G MiFi device which allows for privilege escalation ...
DIY Video Surveillance Barry van kampen This 2 hour lab-session will teach you how you can setup your own video surveillance ...
KEYNOTE 2: Privacy, Secrecy, Freedom and Power Jennifer Granick Technological advances have both diminished and enhanced the ability to keep information private, but on ...
MyKotakPasir: Automated Binary Analysis Nur muhammed kamil , Lim jun yi In-depth analysis is important to generate heuristic detection for future variants of malware. Due to ...
Blackbox Android: Breaking “Enterprise Class” Applications and Secure Containers Marc Blanchou , Mathew solnik The Android platform is growing in popularity and is quickly being adopted in the enterprise ...
Practical Attacks Against 3G / 4G Telecommunication Networks Daniel Mende , Jim Geovedi In 2010 a number of practical high-profile attacks against GSM has been discussed and demonstrated. ...
Skype Vulnerabilities: Zero Day Exploitation 2011 Benjamin kunz The popular VOIP client Skype has been beaten?! As everyone knows Skype takes security very ...
Packets in Packets: Remotely Exploiting Layer 1 Travis Goodspeed In digital radios, a Layer 1 frame consists of a Preamble, a Start of Frame ...
iPhone Espionage Keith Lee The passcode gives the owner a false impression that the iPhone is secured but it ...
Femtocells: A Poisonous Needle in the Operator’s Hay Stack Nico Golde , Ravishankar Borgaonkar , Kevin Redon Femtocells are an emerging technology deployed by the operators around the world to enhance 3G ...
Malware Sandboxing the Xandora Way Kaijern lau Xandora is a malware sandbox. The idea of Xandora sandbox is for performance, simplified reporting ...
Advanced Lock Picking and Impressioning Deviant Ollam , Babak Javadi Lockpicking is a terrific skill to have, and it can allow you to open doors, ...
iPhone Exploitation: One ROPe to Bind Them All? Stefan Esser Exploitation of iPhones and other devices based on iOS requires very sophisticated ROP payloads because ...
Attacking The GPRS Roaming eXchange (GRX) Philippe Langlois GRX is the global private network where telecom network operators exchange GPRS roaming traffic of ...
Air Travel Hacking: Understanding and (Ab)Using the Global Distribution System Hendrik Scholz In the recent years air travel has become a commodity and generally cheaper thanks to ...
Web Wars 3 Saumil Udayan Shah “I know not with what weapons World War III will be fought, but World War ...