Monitoring

Title Speakers Conference Tags
Introducing Daisho - monitoring multiple communication technologies at the physical layer Michael Ossmann , Dominic Spill TROOPERS-2013 - Heidelberg, Germany Monitoring Hardware General Interception
You wouldn't share a syringe. Would you share a USB port? Sergey Bratus , Travis Goodspeed TROOPERS-2013 - Heidelberg, Germany Monitoring Hardware General USB
Selfdefending Databases Alexander Kornbrust Hashdays-2012 - Lucerne,Switzerland Monitoring Databases Honeypot
Fun With Flow Richard Friedberg ShmooCon-2011 - Washington DC, USA Security Monitoring Analysis
3D Modeling And Visualization Of Real Time Security Events Dan Klinedinst ShmooCon-2011 - Washington DC, USA Security Monitoring Analysis
Sagan Real-Time Log/Event Monitoring & Correlation Beave Berlinsides-2010 - Berlin, Germany Monitoring
Ontolog: A Security Log Analyses Tool Using Web Semantic And Ontology Felipe Ferraz OWASP IBWAS-2010 - Portugal Monitoring
Watching The Watchmen Jesus Alvarez Cedillo BugCon-2010 - Mexico Monitoring
Outbound Monitoring Of Web Servers: A Forgotten Child In Information Security? Wong Onn Chee OWASP China-2010 - China Security Web Monitoring
Resilient Botnet Command And Control With Tor Dennis Brown HITBSecConf Malaysia-2010 - Kuala Lampur, Malaysia Security Monitoring Analysis Malware Botnets
Purpose Built Tools For Cyber Security Monitoring Stuart Wilson CyberSec -2010 - Brussels, Belgium Security Others Monitoring
Security And Privacy Vulnerabilities Of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study Ishtiaq Rouf , Rob Miller , Hossen Mustafa , Travis Taylor , Sangho Oh , Wenyuan Xu , Marco Gruteser , Wade Trappe , Ivan Seskar 19th USENIX Security Symposium-2010 - Washington DC, USA Security Wireless Privacy Monitoring
Using Trusted Sensors To Monitor Patients' Habits Alec Wolman , Stefan Saroiu , Victor Bahl HealthSec-2010 - Washington DC, USA Monitoring
Letting The Air Out Of Tire Pressure Monitoring Systems Mike Metzger DEF CON-18 - Las Vegas, USA Security Monitoring
Open Public Sensors And Trend Monitoring Daniel Burroughs DEF CON-18 - Las Vegas, USA Security Monitoring
Real Life Csi: Data Mining And Intelligence Gathering For The Masses Chris Roberts OWASP FROC-2010 - Denver, USA Security Monitoring Data Exfiltration
Escalating Privileges Through Secondary Logon (Runas) Processes Dave Porcello Security B-Sides Boston-2010 - Boston, USA Monitoring
Where Did Those Damn Packets Go? Kevin A Nassery THOTCON-1 - Chicago, USA Security Infrastructure Access Monitoring
How To Detect Penetration Testers Ron Gula SOURCE Boston-2010 - Boston, USA Security Firewall Monitoring
Failagain'S Island - The Perils Of Banking In An Island Nation Andrew Hay SOURCE Boston-2010 - Boston, USA Security Monitoring Malware
Web Scanners For The Win... Louis Nyffenegger Ruxcon-2010 - Melbourne, Austrailia Web Monitoring
Protecting Systems Through Log Mgmt And System Integrity David Burt CarolinaCon6-2010 - Raleigh, USA Security Monitoring
Transparent Proxy Abuse Robert Auger OWASP Appsec-2009 - Washington DC, USA Security Web Monitoring
Custom Intrusion Detection Techniques For Monitoring Web Applications Matthew Olney OWASP Appsec-2009 - Washington DC, USA Web Anonymity Privacy Monitoring
Red And Tiger Team Chris Nickerson BruCON-2009 - Brussels, Belgium Mobile Security Security Others Deep Knowledge Application Security Monitoring Social Engineering Reverse Engineering Network Penetration Physical Pentesting
Building An All-Channel Bluetooth Monitor Michael Ossmann , Dominic Spill ShmooCon-2009 - Washington DC, USA Security Wireless Monitoring Community
Windows Mobile Rootkit - Updated Petr Matousek SyScan-2008 - Singapore Security Rootkits Monitoring
Intercepting Mobile Phone/Gsm Traffic David Hulton ShmooCon-2008 - Washington DC, USA Security Monitoring
10Ge Monitoring Live! Arien Vijn Chaos Communication Congress-24 - Berlin, Germany Security Monitoring
Honeyjax (Aka Web Security Monitoring And Intelligence 2.0) Dan Hubbard DEF CON-15 - Las Vegas, USA Security Web Monitoring
A 10Ge Monitoring System Arien Vijn Chaos Communication Congress-23 - Berlin, Germany Security Monitoring
Towards An Invisible Honeypot Monitoring System Nguyen Anh Quynh HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Monitoring
Client Honeypots - It’S Not Only The Network Michael L. Davis HITBSecConf Malaysia-2006 - Kuala Lampur, Malaysia Security Web Monitoring Community Analysis Malware
Network Monitoring And The Law Alexander Muentz HOPE Number 6-2006 - USA Security Monitoring
How To Automatically Sandbox Iis With Zero False Positive And Negative Tzi-cker Chiueh Blackhat Europe-2006 - Amsterdam, The Netherlands Security Infrastructure Monitoring Analysis Business
Network Security Monitoring With Sguil (Build It!) Richard Bejtlich ShmooCon-2006 - Washington DC, USA Security Monitoring
Advances In Single Packet Authorization (Build It!) Michael Rash ShmooCon-2006 - Washington DC, USA Security Access Monitoring Exploitation
Anonym.Os: Security And Privacy, Everywhere You Go (Build It!) Taylor Banks , Gavin Mead , Kevin Miller , Beth Milliken ShmooCon-2006 - Washington DC, USA Security Anonymity Access Privacy Monitoring Risk Legal Development
Black Ops Of Tcp/Ip 2005.5 (Build It!) Dan Kaminsky ShmooCon-2006 - Washington DC, USA Security Infrastructure Monitoring
Autodafé: An Act Of Software Torture Martin Vuagnoux Chaos Communication Congress-22 - Berlin, Germany Security Monitoring
On The Effectiveness Of Distributed Worm Monitoring Moheeb Abu Rajab , Andreas Terzis , Fabian Monrose 14th USENIX Security Symposium-2005 - Baltimore, USA Security Monitoring
Human-Computer Interaction Opportunities For Improving Security Ben Shneiderman 14th USENIX Security Symposium-2005 - Baltimore, USA Security Monitoring Analysis Development
Open Problems With Certifying Compilation Greg Morrisett 14th USENIX Security Symposium-2005 - Baltimore, USA Security Monitoring
A New Hybrid Approach For Infrastructure Discovery, Monitoring And Control Ofir Arkin DEF CON-13 - Las Vegas, USA Security Infrastructure Monitoring
“Sidewinder”: An Evolutionary Guidance System For Malicious Input Crafting Ryan Cunningham , Shawn Embleton Blackhat USA-2005 - Las Vegas, USA Security Fuzzing Monitoring Testing Automation
Advanced Linux Kernel Keylogger Red Dragon HITBSecConf Malaysia-2003 - Kuala Lampur, Malaysia Security Monitoring
Self-Abuse For Smarter Log Monitoring Mick Bauer DEF CON-11 - Las Vegas, USA Security Monitoring
Fun With 802.11B Dragorn , Porkchop , Static Fusion H2K2-2002 - USA Security Wireless Panel Monitoring
Intrusion Detection And Monitoring Thorsten Ziegler Chaos Communication Congress-18 - Berlin, Germany Security Monitoring
Stress Test In Monitoring Equipment Ano Nym Chaos Communication Congress-17 - Berlin, Germany Security Monitoring
Big Brother Is Watching You: Camera Surveillance In Germany Jadis Chaos Communication Congress-16 - Berlin, Germany Security Monitoring Legal
A Secure Station For Network Monitoring And Control Vassilis Prevelakis 8th USENIX Security Symposium-1999 - Washington DC, USA Security Monitoring
Defeating Network Intrusion Detection. Thomas Ptacek Blackhat USA-1998 - Las Vegas, USA Security Monitoring
Securing Your Network With Free Utilities. Peter Shipley Blackhat USA-1997 - Las Vegas, USA Security Monitoring