Infrastructure

Title Speakers Conference Tags
Logstash - Open Source Log And Event Management Jordan Sissel CarolinaCon-7 - Raleigh, USA Security Infrastructure
The Getaway: Methods And Defenses For Data Exfiltration Sean Coyne ShmooCon-2011 - Washington DC, USA Security Infrastructure
How Not To Implement A Payback/Cashback System Thierry Zoller OWASP BeNelux-2010 - Netherlands Infrastructure Exploitation
0Wning Networks With Voip And Web Attacks Radu State OWASP BeNelux-2010 - Netherlands Infrastructure Firewall Exploitation Web Security
Framed! Security-Patching Common Web Development Frameworks Rafal Los , Joshua Abraham OWASP Appsec-2010 - Washington DC, USA Security Infrastructure Web Application Security
10 Things Yore Doing Wrong With Siem Wim Remes SOURCE Barcelona-2010 - Barcelona, Spain Security Infrastructure Others Business
Protecting Network Services Using Kernel Modules And Iptables Mark Schejtman BugCon-2010 - Mexico Security Infrastructure Risk Network Penetration
Ameba Framework Carlos A. Lozano BugCon-2010 - Mexico Security Infrastructure
Tlalok Framework. Desarrollando En Php5 De Forma Rápida Y Segura. Developed In Php5 Quickly And Safely. Basil Briseño BugCon-2010 - Mexico Security Infrastructure Development
Snmp - Simple Network Mediated (Cisco) Pwnage Georg Christian Pranschke ZaCon-2 - Johannesburg, South Africa Security Infrastructure Access Network Penetration
Detecting Backdoors With Network Trickery Simeon Miteff ZaCon-2 - Johannesburg, South Africa Security Infrastructure Firewall Access
Seccubus Workshop Frank Breedijk BruCON-2010 - Brussels, Belgium Security Infrastructure Application Security
Global Cybersecurity Agenda (Gca) With A Focus On The Deployment Of Solutions Through Impact (Global Response Centre) Alexander Ntoko CyberSec -2010 - Brussels, Belgium Security Infrastructure Incident Response Cyberwar Development
Collaborative Intrusion Detection Framework: Characteristics, Adversarial Opportunities And Countermeasures Sahin Albayrak , Seyit Ahmet Camtepe , Rainer Bye CollSec-2010 - Washington DC, USA Security Infrastructure Intrusion Detection Incident Response Intrusion Prevention
Efficiency-Oriented Collaboration Yaniv Altshuler CollSec-2010 - Washington DC, USA Security Infrastructure Business
Using Recursive Incentives To Win The Darpa Network Challenge Galen Pickard CollSec-2010 - Washington DC, USA Security Computer Forensics Infrastructure Computer Forensics Network Penetration
Securing Medical Research Data With A Rights Management System Mohammad Jafari , Reihaneh Safavi-naini , Chad Saunders , Nicholas Paul Sheppard HealthSec-2010 - Washington DC, USA Security Infrastructure
Cyberterrorism And The Security Of The National Drinking Water Infrastructure John Mcnabb DEF CON-18 - Las Vegas, USA Security Infrastructure
Low Scuttling Chilli Crab:Network Recon 2010Ad Metlstorm OWASP New Zealand-2010 - New Zealand Security Infrastructure Web Analysis
Striking Back Web Attackers Striking Attackers SyScan-2010 - HangZhou, China Security Infrastructure Web Legal Forensics
Https Can Byte Me Josh Sokol , Robert ( Rsnake ) Hansen Blackhat USA-2010 - Las Vegas, USA Security Infrastructure Exploitation
Saprouter - An Internet Window To Your Sap Platform Mariano Nunez Di croce HITBSecConf Amsterdam-2010 - Amsterdam, The Netherlands Security Infrastructure
The Emperor Has No Clothes: Insecurities In Security Infrastructure Ben Feinstein , Jeff King Blackhat USA-2010 - Las Vegas, USA Security Infrastructure
Changing Threats To Privacy: From Tia To Google Moxie Marlinespike Blackhat USA-2010 - Las Vegas, USA Security Infrastructure Privacy Community
Cloudinomicon: Idempotent Infrastructure, Survivable Systems & Bringing Sexy Back To Information Centricity Christofer ( Hoff ) Hoff Blackhat USA-2010 - Las Vegas, USA Security Infrastructure
The Principles Of Secure Development David Rook Security B-Sides Las Vegas-2009 - Las Vegas, USA Security Infrastructure
Sneak Peek At Pci 2.0 Changes Jamey Heary Security B-Sides Denver-2010 - Denver, USA Security Infrastructure
Definitions Framework For Cyber Conflict Peeter Lorents CCDCOE-2010 - Estonia Security Infrastructure Cyberwar
Track Keynote: Breakingpoint Systems – Deep Packet Inspection Richard Favier CCDCOE-2010 - Estonia Security Infrastructure Others Analysis
Understanding Cyber Operations In A Canadian Strategic Context: More Than C4Isr, More Than Cno Melanie Bernier, J. Treurniet CCDCOE-2010 - Estonia Infrastructure
Conceptual Framework For Cyber Security And Conflicts Heli Tiirmaa-klaar CCDCOE-2010 - Estonia Security Infrastructure Cyberwar
Cyber Attacks And The Resilience Of Internet Infrastructure Rytis Rainys CCDCOE-2010 - Estonia Security Infrastructure Intrusion Detection Incident Response Cyberwar
A Web Vulnerability Assessment View Jeremiah Grossman SANS Pen Test Summit-2010 - Baltimore, USA Security Infrastructure Web Application Security Access
Tumbling Down The Rabbit Hole: Exploring The Idiosyncrasies Of Botmaster Systems In A Multi-Tier Botnet Infrastructure Greg Sinclair , Chris Nunnery , Brent ByungHoon Kang 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats-2010 - San Jose, USA Security Infrastructure
Where Did Those Damn Packets Go? Kevin A Nassery THOTCON-1 - Chicago, USA Security Infrastructure Access Monitoring
Rugged Software: A Value Based Strategy For Improving Our Digital Infrastructure Josh Corman SOURCE Boston-2010 - Boston, USA Security Infrastructure
Anonymity, Privacy, And Circumvention With Tor In The Real World Jake Appelbaum , Moxie Marlinspike SOURCE Boston-2010 - Boston, USA Security Infrastructure Privacy Community
Mitigating Attacks With Existing Network Infrastructure Omar Santos CarolinaCon6-2010 - Raleigh, USA Security Infrastructure Network Penetration
Supercharged Password Cracking Rick Redman Security B-Sides Austin-2010 - Austin, USA Security Infrastructure
Cat /Proc/Sys/Net/Ipv4/Fuckups Fabian "fabs" Yamaguchi Chaos Communication Congress-26 - Berlin, Germany Security Infrastructure
Vulnerability Management Scoring Systems Evert Smith ZaCon-1 - Johannesburg, South Africa Security Infrastructure Network Penetration
Tcp Sorcery Barry Irwin ZaCon-1 - Johannesburg, South Africa Security Infrastructure Network Penetration
Telco 2.0 : Security Of Next-Generation Telecom Services Nico Fischbach SOURCE Barcelona-2009 - Barcelona, Spain Security Infrastructure
Auditing Voip Sandro Gauci , Joffrey Czarny BruCON-2009 - Brussels, Belgium Security Infrastructure
Recoverable Advanced Metering Infrastructure Mike Davis Blackhat USA-2009 - Las Vegas, USA Security Infrastructure
All Your Packets Are Belong To Us - Attacking Backbone Technologies Enno Rey , Daniel Mende ShmooCon-2009 - Washington DC, USA Security Infrastructure
La Quadrature Du Net - Campaigning On Telecoms Package Jérémie Zimmermann Chaos Communication Congress-25 - Berlin, Germany Security Infrastructure Development
A Fox In The Hen House - Upnp Igd Jonathan Squire HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Infrastructure Wireless Web Media
Moocherhunting: Real-Time Geo-Location Of Moochers, Hackers And Unauthorized Wifi Users Julian Ho HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Infrastructure Wireless Access Auditing Testing
Bluetooth V2.1 - A New Security Infrastructure And New Vulnerabilities Andrew Lindell Blackhat USA-2008 - Las Vegas, USA Security Infrastructure
Enterprise Security In The Brave New (Virtual) World Tal Garfinkel 17th USENIX Security Symposium-2008 - San Jose, USA Security Infrastructure
A Collaborative Approach To Hardware Hacking: Nycresistor Bre Friends The Last HOPE-2008 - USA Security Infrastructure
Phreaks, Confs, And Jail Tprophet The Last HOPE-2008 - USA Security Infrastructure
Vlans Layer 2 Attacks: Their Relevance And Their Kryptonite Kevin Figueroa , Marco Figueroa , Anthony L. Williams The Last HOPE-2008 - USA Security Infrastructure
Climbing Everest: An Inside Look At Voting Systems Used By The State Of Ohio Sandy Clark , Eric Cronin , Gaurav Shah , Micah Sherr , Pavol Cerny , Adam Aviv , Matt Blaze ShmooCon-2008 - Washington DC, USA Security Infrastructure Analysis
Hacking Scada: How To 0Wn Critical National Infrastructure Alessio Mayhem HITBSecConf Malaysia-2007 - Kuala Lampur, Malaysia Security Infrastructure
Injecting Rds-Tmc Traffic Information Signals - How To Freak Out Your Sat Nav System Andrea Barisani HITBSecConf Malaysia-2007 - Kuala Lampur, Malaysia Security Infrastructure Community
Spamscatter: Characterizing Internet Scam Hosting Infrastructure Geoffrey M. Voelker , Stefan Savage , David S. Anderson , Chris Fleizach 16th USENIX Security Symposium-2007 - Boston, USA Security Infrastructure
Protecting Your It Infrastructure From Legal Attacks- Subpoenas, Warrants And Transitive Trust Alexander Muentz DEF CON-15 - Las Vegas, USA Security Infrastructure Legal
Bypassing Nac Systems (Part Ii) Ofir Arkin ShmooCon-2007 - Washington DC, USA Security Infrastructure Access
Home-Grown Crypto (Aka Taking A Shiv To A Gun Fight) Hank Leininger , Klayton Monroe ShmooCon-2007 - Washington DC, USA Security Infrastructure Analysis
Router And Infrastructure Hacking Raven Alder Chaos Communication Congress-23 - Berlin, Germany Security Infrastructure
23C3 Network Review Stefan Wahl , Elisa Jasinska , Maxim Salomon , Niels Bakker Chaos Communication Congress-23 - Berlin, Germany Security Infrastructure
Security Engineering In Windows Vista Ian Hellen HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Infrastructure Community Risk Analysis
Dns Abuse Infrastructure And Games Gadi Evron DEF CON-14 - Las Vegas, USA Security Infrastructure DNS
On The Release Of Crls In Public Key Infrastructure Chengyu Ma , Nan Li 15th USENIX Security Symposium-2006 - Vancouver, Canada Security Infrastructure
How To Automatically Sandbox Iis With Zero False Positive And Negative Tzi-cker Chiueh Blackhat Europe-2006 - Amsterdam, The Netherlands Security Infrastructure Monitoring Analysis Business
Black Ops Of Tcp/Ip 2005.5 (Build It!) Dan Kaminsky ShmooCon-2006 - Washington DC, USA Security Infrastructure Monitoring
Homeland Security: Networking, Security, And Policy Douglas Maughan 14th USENIX Security Symposium-2005 - Baltimore, USA Security Infrastructure
A New Hybrid Approach For Infrastructure Discovery, Monitoring And Control Ofir Arkin DEF CON-13 - Las Vegas, USA Security Infrastructure Monitoring
Carrier Voip Security Nicolas Fischbach Blackhat USA-2005 - Las Vegas, USA Security Infrastructure Access
Cisco Ios Security Architecture Michael Lynn Blackhat USA-2005 - Las Vegas, USA Security Infrastructure
Building An Early Warning System In A Service Provider Network Nico Fischbach SyScan-2004 - Singapore Security Infrastructure Statistics
Is Phreaking Dead? We Beg To Differ! Emmanuel Gadaix HITBSecConf Malaysia-2004 - Kuala Lampur, Malaysia Security Infrastructure
Information Network Security Issues In The Communications And Multimedia Industry Toh SWEE Hoe HITBSecConf Malaysia-2004 - Kuala Lampur, Malaysia Security Infrastructure
Protecting The Internet Infrastructure John Ioannidis 12th USENIX Security Symposium-2003 - Washington DC, USA Security Infrastructure
Ddos Mitigation And Analysis At The Infrastructure Level Nicolas Fischbach Blackhat Europe-2003 - Amsterdam, The Netherlands Security Infrastructure Analysis
Dynamic Routing Inside Ipsec Vpns - New Threats And Defenses Paul Knight Blackhat USA-2002 - Las Vegas, USA Security Routing Infrastructure
Locking Down Your Freebsd Install Rich Murphey Blackhat USA-2002 - Las Vegas, USA Security Routing Infrastructure
Attacking Networked Embedded Systems Kim0 , Felix ( FX ) Lindner Blackhat USA-2002 - Las Vegas, USA Security Routing Infrastructure
Ip Backbone Security Nicolas Fischbach , Sébastien Lacoste-séris Blackhat USA-2002 - Las Vegas, USA Security Routing Infrastructure
Putting 2 And 2 Together: Designing Security Into Your Network Infrastructure Stephen Dugan Blackhat USA-2002 - Las Vegas, USA Security Routing Infrastructure
Hacking Layer 2: Fun With Ethernet Switches Sean Convery Blackhat USA-2002 - Las Vegas, USA Security Routing Infrastructure
Cracking Voip Architecture Based On The Session Initiation Protocol (Sip) Ofir Arkin Blackhat USA-2002 - Las Vegas, USA Security Routing Infrastructure
The Attractive Domain - The Future Of Convergence Dahtlosen Manfred Berger , Heinz Kreft Chaos Communication Congress-18 - Berlin, Germany Security Infrastructure Wireless
Protecting Your Ip Network Infrastructure Nicolas Fischbach Blackhat Europe-2001 - Amsterdam, The Netherlands Security Infrastructure
Apples, Oranges And The Public Key Infrastructure (Pki) Paul Oorschot 8th USENIX Security Symposium-1999 - Washington DC, USA Security Infrastructure