Conferences for the period :

ShmooCon-2011 - Washington DC, USA
Total Talks : 49 Tags : Mobile Security,Android,Security,Community,Panel,Analysis,Infrastructure,Statistics,Wireless,Forensics,Monitoring,Web,Testing,Legal,Access,Exploitation,Malware,Development,Business,Browser,Automation,Privacy CarolinaCon-7 - Raleigh, USA
Total Talks : 16 Tags : Security,Community,Testing,Business,Malware,Risk,Cryptography,Infrastructure,Analysis Security B-Sides Cleveland-2011 - Cleveland, USA
Total Talks : 6 Tags : Security Security B-Sides MSP-2011 - Saint Paul, USA
Total Talks : 7 Tags : Security Security B-Sides San Francisco-2011 - San Francisco, USA
Total Talks : 27 Tags : Security CanSecWest-2011 - Vancouver, Canada
Total Talks : 17 Tags : Security Blackhat Europe-2011 - Barcelona, Spain
Total Talks : 28 Tags : Security Hackito Ergo Sum-2011 - Paris, France
Total Talks : 16 Tags : Security Infiltrate-2011 - Miami, USA
Total Talks : 14 Tags : Security Notacon-8 - Cleveland, USA
Total Talks : 39 Tags : Security Nullcon-2011 - Goa, India
Total Talks : 26 Tags : Security TROOPERS-2011 - Heidelberg, Germany
Total Talks : 22 Tags : Security FloCon-2011 - Salt Lake City, USA
Total Talks : 22 Tags : Security SOURCE Boston-2011 - Boston, USA
Total Talks : 1 Tags : Exploitation BlackHatDC-2011 - Washington,USA
Total Talks : 32 Tags : RSA-2011 - N.A,US
Total Talks : 63 Tags :
date of conf number of days name of conf Edition conf URL talk num speaker topic slides
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 1 Jon Oberheide , Zach Lanier Team Joch Vs. Android: The Ultimate Showdown
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 2 Peiter Zatko Analytic Framework For Cyber Security
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 3 Rick Redman , Martin Bos , Robert Imhoff , David Schuetz The Past, Present, And Future Of Something You Know
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 4 Axelle Apvrille , Kyle Yang Defeating Mtans For Profit
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 5 Sean Coyne The Getaway: Methods And Defenses For Data Exfiltration
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 6 Adrian Crenshaw Malicious Usb Devices:Is That An Attack Vector In Your Pocket Or Are You Just Happy To See Me?
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 7 Daniel Crowley Url Enlargement: Is It For You?
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 8 Ray Davidson Shmoocon Labs Goes To College
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 9 Scott Dunlop Reverse Engineering Using The Android Emulator
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 10 Sarah Edwards Inside The App: All Your Data Are Belong To Me
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 11 Marc Eisenbarth Half Baked: Hardware Hacking Mixed With Sweet Software Reverse Engineering
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 12 Richard Friedberg Fun With Flow
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 13 Andrew Gavin Gone In 60 Minutes: Stealing Sensitive Data From Thousands Of Systems Simultaneously With Opendlp
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 14 Ron Gutierrez Unlocking The Toolkit: Attacking Google Web Toolkit Applications
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 15 Deral Heiland , Pete Arzamendi Printer To Pwnd: Leveraging Multifunction Printers During Penetration Testing
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 16 Marcia Hofmann Computer Search And Seizure
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 17 Dan Klinedinst 3D Modeling And Visualization Of Real Time Security Events
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 18 Daniel Kovach Yet Another Heapspray Detector
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 19 Jon Larimer Usb Autorun Attacks Against Linux
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 20 Trent Lo An Evite From Surbo? Probably An Invitation For Trouble.
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 21 Johnny Long Hackers For Charity
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 22 John Mcnabb Hacking Smartwater Wireless Water Networks
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 23 Scott Moulton Hard Drive Paperweight: Recovery From A Seized Motor!
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 24 Danny Quist Visual Malware Reversing: How To Stop Reading Assembly And Love The Code
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 25 James Oakley , Sergey Bratus Exploiting The Hard-Working Dwarf
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 26 Michael Ossmann Project Ubertooth: Building A Better Bluetooth Adapter
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 27 Matthew Pawloski , Fotios Lindiakos Intersect: Combining Commercial/Foss Tools With Custom Code To Root Out Malware
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 28 Marsh Ray A Paranoid Schizophrenia-Based Model Of Data Security
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 29 Enno Rey , Daniel Mende Attacking 3G And 4G Mobile Telecommunications Networks
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 30 Richard Rushing Defending Against Targeted Attacks Using Duck Tape, Popsicle Sticks And Legos
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 31 Javier Sanchez Hacking The Business Capability Stack: Make Corporate Bureaucracy Work For You
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 32 Ben Smith Printers Gone Wild!
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 33 Ryan Speers , Ricky Melgares Zigbee Security: Find, Fix, Finish
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 34 Ashley Thomas Tracking Flaws – Stream Reassembly Issues In Snort Ips
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 35 Georgia Weidman Transparent Botnet Control For Smartphones Over Sms
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 36 Tara Whalen Are You Receiving Me? Recent Issues In Wifi Privacy
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 37 Mick Douglas , Larry Pesce Information Disclosure Via P2P Networks
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 38 Daniel Crowley Windows File Pseudonyms
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 39 Steve Dispensa , Marsh Ray Keynote – Closing The Tls Authentication Gap
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 40 Blake Hartstein Jsunpack-Network Edition Release: Javascript Decoding And Intrusion Detection
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 41 Oliver Roeschke , Enno Rey Wlccp – Analysis Of A Potentially Flawed Protocol
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 42 Michael Weigand Build Your Own Predator Uav @ 99.95% Discount
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 43 Scott Moulton Diy Hard Drive Diagnostics: Understanding A Broken Drive
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 44 Tyler Shields Blackberry Mobile Spyware
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 45 Kevin Johnson , Mike Poor The Friendly Traitor: Our Software Wants To Kill Us
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 46 Jim Manley Back To The Glass House
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 47 Brian Holyfield Cracking The Foundation: Attacking Wcf Web Services
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 48 Michael Sutton Pulling The Plug: Security Risks In The Next Generation Of Offline Web Applications
Jan. 28, 2011 2 ShmooCon 2011 http://www.shmoocon.org/ 49 Roger Johnston , Jon Warner Better Approaches To Physical Tamper Detection
date of conf number of days name of conf Edition conf URL talk num speaker topic slides
April 29, 2011 2 CarolinaCon 7 http://www.carolinacon.org/ 1 G. Hardy Tales From The Crypto
April 29, 2011 2 CarolinaCon 7 http://www.carolinacon.org/ 2 Dr. Tran How To Own And Protect Your Office Space
April 29, 2011 2 CarolinaCon 7 http://www.carolinacon.org/ 3 Nick Fury Serial Killers: Usb As An Attack Vector
April 29, 2011 2 CarolinaCon 7 http://www.carolinacon.org/ 4 Adam Drew Music And Audio Production With Free And Open Source Software
April 29, 2011 2 CarolinaCon 7 http://www.carolinacon.org/ 5 Ryan Linn Pig: Finding Truffles Without Leaving A Trace
April 29, 2011 2 CarolinaCon 7 http://www.carolinacon.org/ 6 Deral Heiland If You Own A Multi Function Printer (Mfp), Then I Own You
April 29, 2011 2 CarolinaCon 7 http://www.carolinacon.org/ 7 Michael Goffin Yara And Python: The Malware Detection Dynamic Duo
April 29, 2011 2 CarolinaCon 7 http://www.carolinacon.org/ 8 Thomas (professorfarnsworth) Do Personality Traits Increase The Likelihood That You Will Hack?
April 29, 2011 2 CarolinaCon 7 http://www.carolinacon.org/ 9 Chris Teodorski Kippos And Bits And Bits And Bits: Fun With Ssh Honeypotting
April 29, 2011 2 CarolinaCon 7 http://www.carolinacon.org/ 10 Martin Bos Why Your Password Policy Sucks
April 29, 2011 2 CarolinaCon 7 http://www.carolinacon.org/ 11 Justin Troutman Mackerel: A Progressive School Of Cryptographic Thought
April 29, 2011 2 CarolinaCon 7 http://www.carolinacon.org/ 12 Branson Matheson Ttl Of A Penetration
April 29, 2011 2 CarolinaCon 7 http://www.carolinacon.org/ 13 Jordan Sissel Logstash - Open Source Log And Event Management
April 29, 2011 2 CarolinaCon 7 http://www.carolinacon.org/ 14 Gerry Brunelle Dissecting The Hack: Malware Analysis 101
April 29, 2011 2 CarolinaCon 7 http://www.carolinacon.org/ 15 Lisa Lorenzin Security Lessons From Cracking Enigma
April 29, 2011 2 CarolinaCon 7 http://www.carolinacon.org/ 16 Jp Dunning Hack From A Library With Katana
date of conf number of days name of conf Edition conf URL talk num speaker topic slides
Feb. 18, 2011 0 Security B-Sides Cleveland 2011 1 Dave Kennedy Where We At? A Look At Information Security
Feb. 18, 2011 0 Security B-Sides Cleveland 2011 2 Steve Jaworski Where'S The Flow?
Feb. 18, 2011 0 Security B-Sides Cleveland 2011 3 Mick Douglas Blue Team Is Sexy -- Refocusing On Defense
Feb. 18, 2011 0 Security B-Sides Cleveland 2011 4 Jeff Kirsch Please Step Away From The Binaries: Educating Security
Feb. 18, 2011 0 Security B-Sides Cleveland 2011 5 Gary Sheehan Building An Effective It Grc Environment
Feb. 18, 2011 0 Security B-Sides Cleveland 2011 6 Steve Nosteve Thicknet: It Does More Than Oracle
date of conf number of days name of conf Edition conf URL talk num speaker topic slides
Jan. 7, 2011 0 Security B-Sides MSP 2011 1 David Bryan Pentesting For Fun And Profit
Jan. 7, 2011 0 Security B-Sides MSP 2011 2 Brian Johnson , Mike Jackson Expert Witness Tampering: How Secure Are Your Forensic Image Files From Tampering And What Can We Do About It
Jan. 7, 2011 0 Security B-Sides MSP 2011 3 Barry Caplin You Got Chocolate On My Ipad! - Toys In The Office
Jan. 7, 2011 0 Security B-Sides MSP 2011 4 Kevin Nassery Oops, My Network Sucks
Jan. 7, 2011 0 Security B-Sides MSP 2011 5 Karl Fosaaen Applying Email Spoofing To Sms Messages
Jan. 7, 2011 0 Security B-Sides MSP 2011 6 Glenn Leifheit Building A Hacking Environment With Powershell
Jan. 7, 2011 0 Security B-Sides MSP 2011 7 Rachael Lininger Conflict Resolution Style Preferences Of Information Security Professionals
date of conf number of days name of conf Edition conf URL talk num speaker topic slides
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 1 Daniel Peck Lessons Learned From Running A Bug Bounty Program
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 2 Mike Lloyd Gone In 60 Keystrokes
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 3 Hart Rossman Security, Supply Chains, And You
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 4 Aaron Cohen Selling Security Without Selling Your Soul
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 5 Ray Kelly Screw The Tsa: Iíll Be Where I Want, And Getcredit For It!
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 6 Gal Shpantzer Security Domination Via Hard Drive Isolation
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 7 Nick Selby Post Attack: Working With Law Enforcement
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 8 Brett Hardin , Mike Dahn Being Sneaky About Security And Regulations Or Misdirection: The Rise And Fall And Rise Of Regulatory Compliance
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 9 Joe Gottlieb , Dan Ritari , Andrew Hay Open Security Intelligence: Art Of The Possible Or Science Of The Necessary?
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 10 Song Liu How To Attack Windows Kernel
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 11 David Mortman Cloud Security Realities
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 12 Billy Rios Tba
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 13 Bringing Home The Love: Tips, Tricks And Quips On How To Organize A B-Sides Event In Your Town
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 14 Andy Ellis Letting Someone Else'S Phone Ring At 3 Am: Building Robust Incident Management Frameworks
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 15 Brett Hardin You Are Alone. Enjoy It.
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 16 Hd Moore When Csos Attack
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 17 Anton Chuvakin Something Fun About Using Siem And Not Failing Or Only Failing Non-Miserably Or Not-Too-Miserably
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 18 Ivan Ristic Stop Complaining And Solve A Security Problem Instead!
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 19 Andrew Hay , Richard Bejtlich , Travis Reese , Amit Yoran Attacking Cyber Security Marketecture
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 20 Marc Eisenbarth Active Exploitation Detection
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 21 Dave Shackleford , Andrew Hay A Brief History Of Hacking
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 22 Damon Cortesi Homo Developomicus - Developers Are Human Too
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 23 Robert Zigweid Threat Modeling: Learn To Optimize Your Security Budget
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 24 Kevin Bankston , Marcia Hofmann , Kurt Opsahl , Eva Galperin , Chris Palmer , Julie Samuels Ask The Eff
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 25 Raffael Marty Log Analysis And Visualization In The Cloud
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 26 Scott Dunlop Reverse Engineering Using The Android Emulator
Feb. 14, 2011 1 Security B-Sides San Francisco 2011 27 Davi Ottenheimer Dr. Stuxlove Or: How I Learned To Stop Worrying And Love The Worm
date of conf number of days name of conf Edition conf URL talk num speaker topic slides
March 9, 2011 2 CanSecWest 2011 1 Dong-joo Ha , Ki-chan Ahn Is Your Gaming Console Safe?: Embedded Devices, An Antivirus-Free Safe Hideout For Malware
March 9, 2011 2 CanSecWest 2011 2 Chris Eng , Brandon Creighton Deconstructing Coldfusion
March 9, 2011 2 CanSecWest 2011 3 Dan Kaminski , Adam Cecchetti , Michael Eddington Showing How Security Has (And Hasn'T) Improved, After Ten Years Of Trying
March 9, 2011 2 CanSecWest 2011 4 Aaron Portnoy , Logan Brown Black Box Auditing Adobe Shockwave
March 9, 2011 2 CanSecWest 2011 5 Anonymous Ipv6 Implementation And Security Round Table - A Moderated Disagreement Or A Chorus?
March 9, 2011 2 CanSecWest 2011 6 Andrea Barisani , Daniele Bianco Chip & Pin Is Definitely Broken
March 9, 2011 2 CanSecWest 2011 7 Michael Ossmann Project Ubertooth: Building A Better Bluetooth Adapter
March 9, 2011 2 CanSecWest 2011 8 Graeme Neilson Welcome To Rootkit Country
March 9, 2011 2 CanSecWest 2011 9 Ilja Sprundel Iphone And Ipad Hacking
March 9, 2011 2 CanSecWest 2011 10 Richard Johnson A Castle Made Of Sand: Adobe Reader X Sandbox
March 9, 2011 2 CanSecWest 2011 11 Eric Filiol Dymanic Cryptographic Trapdoors
March 9, 2011 2 CanSecWest 2011 12 Marcia Hofmann The Law Of Web Application Hacking
March 9, 2011 2 CanSecWest 2011 13 Dustin Duran , Matt Miller , David Weston Security Defect Metrics For Targeted Fuzzing
March 9, 2011 2 CanSecWest 2011 14 Nico Golde , Collin Mulliner Sms-O-Death: From Analyzing To Attacking Mobile Phones On A Large Scale
March 9, 2011 2 CanSecWest 2011 15 Marc Schnefeld Borken Fonts: The Story Of Naive Parsers And Attacker Controlled Reboots
March 9, 2011 2 CanSecWest 2011 16 Vincenzo Iozzo , Giovanni Gola Stale Pointers Are The New Black
March 9, 2011 2 CanSecWest 2011 17 Nick Green Grape: Generative Rule-Based Generic Stateful Fuzzing
date of conf number of days name of conf Edition conf URL talk num speaker topic slides
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 1 Bruce Schneier Keynote: Cyberwar
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 2 Patroklos Argyroudis , Dimitrios Glynos Protecting The Core: Kernel Exploitation Mitigations
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 3 Don Bailey Attacking Microcontroller Environments From A Software Perspective
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 4 Marco Balduzzi Http Parameter Pollution Vulnerabilities In Web Applications
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 5 Mihai Chiriac Rootkit Detection Via Kernel Code Tunneling
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 6 Claudio Criscione You Are Doing It Wrong: Failures In Virtualization Systems
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 7 Nitesh Dhanjani New Age Attacks Against Apple'S Ios (And Countermeasures)
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 8 Jason Geffner Exporting Non-Exportable Rsa Keys
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 9 Yuri Gushin , Alex Behar Building Floodgates: Cutting-Edge Denial Of Service Mitigation
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 10 George Hedfors Owning The Data Centre Using Cisco Nx-Os Based Switches
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 11 Vincenzo Iozzo Workshop: The Mac Exploit Kitchen
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 12 Tom Keetch Escaping From Microsoft Windows Sandboxes
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 13 Felix Lindner Building Custom Disassemblers
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 14 Rafal Los Defying Logic - Theory, Design, And Implementation Of Complex Systems For Testing Application Logic
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 15 Andrew Macpherson , Roelof Temmingh Workshop: Extending Maltego With Your Applications, Scripts And Data.
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 16 Wim Remes , Xavier Mertens Workshop: Grepping For Gold
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 17 Sebastian Muniz , Alfredo Ortega Fuzzing And Debugging Cisco Ios
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 18 Matthew Neely , Spencer Mcintyre Eapeak - Wireless 802.1X Eap Identification And Foot Printing Tool
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 19 Tom Parker Stuxnet Redux: Malware Attribution & Lessons Learned
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 20 Damir Rajnovic Monoculture - The Other Side
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 21 Wim Remes Among The Blind, The Squinter Rules : Security Visualization In The Field.
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 22 Andrès Riancho Web Application Payloads
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 23 Thomas Roth Breaking Encryption In The Cloud: Gpu Accelerated Supercomputing For Everyone
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 24 Justin Searle Attacking And Defending The Smart Grid
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 25 Justin Searle Workshop: A Taste Of The Latest Samurai-Wtf Dvd
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 26 Raul Siles Sap: Session (Fixation) Attacks And Protections (In Web Applications)
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 27 Chris Valasek , Ryan Smith Exploitation In The Modern Era
March 17, 2011 1 Blackhat Europe 2011 http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html 28 Andreas Wiegenstein The Abap Underverse - Risky Abap To Kernel Communication And Abap-Tunneled Buffer Overflows
date of conf number of days name of conf Edition conf URL talk num speaker topic slides
April 7, 2011 2 Hackito Ergo Sum 2011 1 Jon Oberheide , Dan Rosenberg Kernel Fun Tba
April 7, 2011 2 Hackito Ergo Sum 2011 2 Joernchen Ruby On Rails From A Code Auditorís Perspective
April 7, 2011 2 Hackito Ergo Sum 2011 3 Marc Heuse Recent Advanced In Ipv6 Insecurities
April 7, 2011 2 Hackito Ergo Sum 2011 4 Aaron Portnoy , Logan Brown Concentrated Fire: Black Box Auditing Adobe Shockwave
April 7, 2011 2 Hackito Ergo Sum 2011 5 Richard Johnson A Castle Made Of Sand: Adobe Reader X Sandbox
April 7, 2011 2 Hackito Ergo Sum 2011 6 James Oakley , Sergey Bratus Exploiting The Hard-Working Dwarf
April 7, 2011 2 Hackito Ergo Sum 2011 7 Itzik Kotler Let Me Stuxnet You
April 7, 2011 2 Hackito Ergo Sum 2011 8 Tarjei Mandt Kernel Pool Exploitation On Windows 7
April 7, 2011 2 Hackito Ergo Sum 2011 9 Eloi Vanderbèken Hackito Ergo Sum Crackme
April 7, 2011 2 Hackito Ergo Sum 2011 10 Rodrigo Branco Behind The Scenes: Security Research
April 7, 2011 2 Hackito Ergo Sum 2011 11 Gabriel Gonzalez Man-In-Remote: Pkcs11 For Fun And Non-Profit
April 7, 2011 2 Hackito Ergo Sum 2011 12 Jon Larimer Autorun Attacks Against Linux
April 7, 2011 2 Hackito Ergo Sum 2011 13 Eric Freyssinet Hacking Investigations In Practice
April 7, 2011 2 Hackito Ergo Sum 2011 14 Yuval Polevoy Money Is In The Eye Of The Beholder: New And Exciting Ways To Steal Your Cash
April 7, 2011 2 Hackito Ergo Sum 2011 15 Mate Soos Craking Industry Ciphers At A Whim
April 7, 2011 2 Hackito Ergo Sum 2011 16 Raoul Chiesa Tba
date of conf number of days name of conf Edition conf URL talk num speaker topic slides
April 16, 2011 1 Infiltrate 2011 1 Dave Aitel Infiltrate Welcome
April 16, 2011 1 Infiltrate 2011 2 Nico Waisman Keynote - Creating Strategic Surprise In Information Security
April 16, 2011 1 Infiltrate 2011 3 Bas Alberts , Massimiliano Oldani Rock'M Sock'M Robots: Exploiting The Android Attack Surface
April 16, 2011 1 Infiltrate 2011 4 Chris Valasek , Ryan Smith Modern Heap Exploitation Using The Low Fragmentation Heap
April 16, 2011 1 Infiltrate 2011 5 Esteban Guillardoy The Listening
April 16, 2011 1 Infiltrate 2011 6 Thomas Dullien State Spaces And Exploitation
April 16, 2011 1 Infiltrate 2011 7 Ben Nagy How To Fail At Fuzzing
April 16, 2011 1 Infiltrate 2011 8 Ronald Huizer Don'T Give Credit: Hacking Arcade Machines
April 16, 2011 1 Infiltrate 2011 9 Cesar Cerrudo Bypassing Windows Services Protections
April 16, 2011 1 Infiltrate 2011 10 Tarjei Mandt Modern Kernel Pool Exploitation: Attacks And Techniques
April 16, 2011 1 Infiltrate 2011 11 Ms09-050 Break Sponsored
April 16, 2011 1 Infiltrate 2011 12 Ryan Austin , Sean Arries Infiltrating Php
April 16, 2011 1 Infiltrate 2011 13 Sean Heelan , Agustin Gianni Attacking The Webkit Heap
April 16, 2011 1 Infiltrate 2011 14 Georg Wicherski Fun With The Ldt: Fast & Generic Shellcode Detection
date of conf number of days name of conf Edition conf URL talk num speaker topic slides
April 15, 2011 3 Notacon 8 1 Project Ruori Kinetic Music
April 15, 2011 3 Notacon 8 2 Catfood Hacking The Man: Your Guide To The Courtroom
April 15, 2011 3 Notacon 8 3 Aestetix The Greatest Show On Earth: How To Create, Populate, And Delegate A Successful Event
April 15, 2011 3 Notacon 8 4 Chris Anderson , Andrea Long Corporate Evil: The Legal Way To Commit Fraud And Murder Or How I Learned To Stop Worrying And Love Corruption
April 15, 2011 3 Notacon 8 5 James Arlen , Tom Eston , Chris Clymer , Brandon Knight , Matthew Neely Social Engineering Business Into Your Security
April 15, 2011 3 Notacon 8 6 James Arlen I'Ll Take "Myrcurial" For $100
April 15, 2011 3 Notacon 8 7 Randy Beiter Keeping Secrets For Ios Developers
April 15, 2011 3 Notacon 8 8 Jp Bourget , Rob Fuller Deep Magic 101: The Wizard'S First Rule
April 15, 2011 3 Notacon 8 9 Adrian Crenshaw Funnypots And Skiddy Baiting
April 15, 2011 3 Notacon 8 10 Kizz Myanthia Weaponizing The Smartphone: Deploying The Perfect Wmd
April 15, 2011 3 Notacon 8 11 Joncates , Jake Elliott , Tamas Kamenczy Artgames Lan Party
April 15, 2011 3 Notacon 8 12 Tom Eston , Kevin Johnson Social Zombies Gone Wild: Totally Exposed And Uncensored
April 15, 2011 3 Notacon 8 13 Dewzi Preventing Viruses From Stds To .Exes
April 15, 2011 3 Notacon 8 14 Seth Hardy Propane And Electrons
April 15, 2011 3 Notacon 8 15 David Kennedy Strategic Penetration Testing - Changing The Way We Hack
April 15, 2011 3 Notacon 8 16 Jeff Kirsch , Ghostnomadjr One Bad Cookie
April 15, 2011 3 Notacon 8 17 Jeff Kirsch Educating Security Means A New Approach
April 15, 2011 3 Notacon 8 18 Alex Leitch Laser Cutters: Not Only For Use On Your Remaining Eye
April 15, 2011 3 Notacon 8 19 Ryan Linn Collecting Underpants To Win Your Network
April 15, 2011 3 Notacon 8 20 Darth Vader Ssl Wars - The Dark Side Of Ssl
April 15, 2011 3 Notacon 8 21 Page Mckay We Are All Game-Makers: An Everyman'S Approach To Game Development
April 15, 2011 3 Notacon 8 22 Kevin Nassery Oh Shit: The Top Five Major F*!K Ups Of My Career, And How I Grew From Them.
April 15, 2011 3 Notacon 8 23 Matthew Neely Pen Testing - Moving From Art To Science
April 15, 2011 3 Notacon 8 24 Nicolle Neulist The Free Software Studio: Open-Source Tools For Musical Exploration And Composition
April 15, 2011 3 Notacon 8 25 Shane Nimbus , Michael Palumbo Open Source Intelligence: The Legal Do'S And Don'Ts Of Digital Profiling
April 15, 2011 3 Notacon 8 26 Mike Olenik Tabletop Game Design 101: Idea To Reality
April 15, 2011 3 Notacon 8 27 Alex Papadimoulis Hacking The Workplace: How To Make The Most With The Least
April 15, 2011 3 Notacon 8 28 Joe Peacock Art Of Akira
April 15, 2011 3 Notacon 8 29 Drew Curtis , Joe Peacock You'Ll Get Over It: How Not To Redesign Fark
April 15, 2011 3 Notacon 8 30 Jon Peer Geocaching 101
April 15, 2011 3 Notacon 8 31 Christina Pei Hacking The Classroom: How To Re-Make The Education System
April 15, 2011 3 Notacon 8 32 Rltvty Hdr And Panoramic Photography
April 15, 2011 3 Notacon 8 33 Ed Quiggle The Bleeding Edge Of Neurohacking
April 15, 2011 3 Notacon 8 34 Chris Sanyk How I Finally Made My First Videogame
April 15, 2011 3 Notacon 8 35 Kaimen Searle , Justin Searle The Ancient Sport Of Falconry
April 15, 2011 3 Notacon 8 36 Bill Sempf Is Locksport A Sport?
April 15, 2011 3 Notacon 8 37 David Sieg History Of Scanimate
April 15, 2011 3 Notacon 8 38 Mark Stanislav Being A Puppet Master: Automating Amazon Ec2 With Puppet & Friends
April 15, 2011 3 Notacon 8 39 Mark Stanislav It'S Vulnerableö Now What?: Three Diverse Tales Of Woe And Remediation
date of conf number of days name of conf Edition conf URL talk num speaker topic slides
Feb. 25, 2011 1 Nullcon 2011 1 Fyodor Yarochkin No Bullshit On Underground Crime: Traces, Trends, Attribution, Techniques And More
Feb. 25, 2011 1 Nullcon 2011 2 Saumil Shah Lessons Learned From 2010
Feb. 25, 2011 1 Nullcon 2011 3 Rahul Sasi Penetration Testing A Biometric System
Feb. 25, 2011 1 Nullcon 2011 4 Shashidhar Cyber Crime 101: Cost Of Cyber Crime, Trends And Analysis
Feb. 25, 2011 1 Nullcon 2011 5 Dinesh Bareja Incident Management And Beyond
Feb. 25, 2011 1 Nullcon 2011 6 Deepak Rout Enterprise Paradigm For Controlling Data Leakage
Feb. 25, 2011 1 Nullcon 2011 7 Vishal Gupta Protect Infrastructure Of Protect Information Ñ Lessons From Wikileaks
Feb. 25, 2011 1 Nullcon 2011 8 Alok Vijayant Information Warfare Ñ The Indian Perspective
Feb. 25, 2011 1 Nullcon 2011 9 Pratap Reddy Future Of Cyber Crimes: Limitations And Challenges
Feb. 25, 2011 1 Nullcon 2011 10 Wolfgang Kandek Vulnerabilities And Malware: Statistics And Research For Malware Identification
Feb. 25, 2011 1 Nullcon 2011 11 Fyodor Yarochkin Building An Intelligence Analysis Systems Using Open Source Tools
Feb. 25, 2011 1 Nullcon 2011 12 Abhijeet Hatekar Chupa Rustam
Feb. 25, 2011 1 Nullcon 2011 13 Manu Zacharia Security And Forensic Discovery In Cloud Environments
Feb. 25, 2011 1 Nullcon 2011 14 Mikel Gastesi , Jose Esparza Zeus Mitmo Ñ A Real Case Of Banking Fraud Through Mobile Phones
Feb. 25, 2011 1 Nullcon 2011 15 Nilesh Sharma , Pulkit Mehndiratta Botnet Detection Approach By Dns Behavior And Clustering Analysis
Feb. 25, 2011 1 Nullcon 2011 16 Vishwas Sharma Fuzzing With Complexities
Feb. 25, 2011 1 Nullcon 2011 17 Harsimran Walia Reversing Microsoft Patches To Reveal Vulnerable Code
Feb. 25, 2011 1 Nullcon 2011 18 Assaf Nativ Memory Analysis Ñ Looking Into The Eye Of The Bits
Feb. 25, 2011 1 Nullcon 2011 19 Jeremy Brown Exploiting Scada Systems
Feb. 25, 2011 1 Nullcon 2011 20 Anurag Dhanda Hacking The Parliament A Classic Social Engineering Attack
Feb. 25, 2011 1 Nullcon 2011 21 Hari Prasad Security Analysis Of Indiaís Electronic Voting Machines: Memoirs Of A Whistleblower
Feb. 25, 2011 1 Nullcon 2011 22 Sunil Kumar Automatic Program Analysis Using Dynamic Binary Instrumentation
Feb. 25, 2011 1 Nullcon 2011 23 Gursev Kalra Sslsmart Ñ Smart Ssl Cipher Enumeration
Feb. 25, 2011 1 Nullcon 2011 24 Prashant Kv , Tamaghna Basu Json Fuzzing: New Approach To Old Problems
Feb. 25, 2011 1 Nullcon 2011 25 Aseem Jakhar Jugaad Beta: Linux Thread Injection For Malware Poc
Feb. 25, 2011 1 Nullcon 2011 26 Chinmaya Kamal , Saurabh Sharma Buffer Underrun Exploits
date of conf number of days name of conf Edition conf URL talk num speaker topic slides
March 28, 2011 3 TROOPERS 2011 1 Enno Rey Opening Keynote
March 28, 2011 3 TROOPERS 2011 2 Richard Thieme Talking Only To Ourselves: The Dangers Of Refusing To Stop, Look And Listen
March 28, 2011 3 TROOPERS 2011 3 Marco Slaviero Cache On Delivery
March 28, 2011 3 TROOPERS 2011 4 Mark Gall , Joachim L¸ken Security And Regulatory Requirements For Public Cloud Offerings To Support Selected Customer Use Cases
March 28, 2011 3 TROOPERS 2011 5 George Hedfors Owning The Data Center Using Cisco Nx-Os
March 28, 2011 3 TROOPERS 2011 6 Chris Gates Attacking Oracle Web Applications With Metasploit
March 28, 2011 3 TROOPERS 2011 7 Dmitry Sklyarov Forging Canon Original Decision Data
March 28, 2011 3 TROOPERS 2011 8 Mariano Croce Your Crown Jewels Online Ñ Attacks To Sap Web Applications
March 28, 2011 3 TROOPERS 2011 9 Julia Wolf Omg Wtf Pdf Ñ What You Didnít Know About Acrobat
March 28, 2011 3 TROOPERS 2011 10 Friedwart Kuhn , Michael Thumann Integration Of The New German Id Card (Npa) In Enterprise Environments Ñ Prospects, Costs & Threats
March 28, 2011 3 TROOPERS 2011 11 Chema Alonso I Foca A .Mil Domain
March 28, 2011 3 TROOPERS 2011 12 Graeme Neilson Tales From The Crypt0
March 28, 2011 3 TROOPERS 2011 13 Rodrigo Branco Dynamic Program Analysis And Software Exploitation: From The Crash To The Exploit Code
March 28, 2011 3 TROOPERS 2011 14 Steve Dispensa , Marsh Ray Ongoing Identity Weaknesses
March 28, 2011 3 TROOPERS 2011 15 Meder Kydyraliev Milking A Horse Or Executing Remote Code In Modern Java Web Frameworks
March 28, 2011 3 TROOPERS 2011 16 Andre Egners Future Directions In Malware Detection On Mobile Handsets
March 28, 2011 3 TROOPERS 2011 17 Sergey Bratus , Edmond Rogers Last Minute Change: Adventures In Scada
March 28, 2011 3 TROOPERS 2011 18 Michael Schaefer , Matthias Luft Security Reflections On Multi Function Devices
March 28, 2011 3 TROOPERS 2011 19 Ravishankar Borgaonkar , Kevin Redon Femtocell: Femtostep To The Holy Grail
March 28, 2011 3 TROOPERS 2011 20 Annonymous Risk Panel
March 28, 2011 3 TROOPERS 2011 21 Felix Leder Do You Know Whatís Happening In Your $Application?
March 28, 2011 3 TROOPERS 2011 22 Heiko Kirsch Business Transparency Via Security Dashboards
date of conf number of days name of conf Edition conf URL talk num speaker topic slides
Jan. 10, 2011 3 FloCon 2011 1 Hiroshi Asakura , Kensuke Nakata , Shingo Kashima , Hiroshi Kurakami Flows As A Toplogy Chart
Jan. 10, 2011 3 FloCon 2011 2 Joel Ebrahimi From Data Collection To Actioní Achieving Rapid Identification Of Cyber Threats And Perpetrators
Jan. 10, 2011 3 FloCon 2011 3 Sid Faber Garbage Collection: Using Flow To Understand Private Network Data Leakage
Jan. 10, 2011 3 FloCon 2011 4 Josh Goldfarb Network Flow Data Analysis Using Graph Pattern Search
Jan. 10, 2011 3 FloCon 2011 5 Phil Groce The Rayon Visualization Toolkit
Jan. 10, 2011 3 FloCon 2011 6 Randy Heins Indexing Full Packet Capture Data With Flow
Jan. 10, 2011 3 FloCon 2011 7 Jeff Janies Protographs: Graph-Based Approach To Netflow Analysis
Jan. 10, 2011 3 FloCon 2011 8 Jeff Janies , Michael Collins Darkspace Construction And Maintenance
Jan. 10, 2011 3 FloCon 2011 9 Kazunori Kamiya Not To Miss Small-Amount But Important Traffic
Jan. 10, 2011 3 FloCon 2011 10 Vojtech Krmicek , Tomas Plesnik Detecting Botnets With Netflow
Jan. 10, 2011 3 FloCon 2011 11 Jeroen Massar Using Flow For Other Things Than Network Data
Jan. 10, 2011 3 FloCon 2011 12 Cory Mazzola , Timothy Tragesser Security Incident Discovery And Correlation On .Gov Networks
Jan. 10, 2011 3 FloCon 2011 13 John Mchugh Detecting Long Flows
Jan. 10, 2011 3 FloCon 2011 14 Peter Mullarkey , Mike Johns , Ben Haley Leveraging Other Data Sources With Flow To Identify Anomalous Network Behavior
Jan. 10, 2011 3 FloCon 2011 15 Christopher Poetzel Dlp Detection With Netflow
Jan. 10, 2011 3 FloCon 2011 16 Dan Ruef Analysis Pipeline
Jan. 10, 2011 3 FloCon 2011 17 Dan Ruef , Emily Sarneso Incorporating Dynamic List Structures Into Yaf
Jan. 10, 2011 3 FloCon 2011 18 Bilal Shebaro , Jedidiah Crandall Privacy Preserving Network Flow Recording
Jan. 10, 2011 3 FloCon 2011 19 Timothy Shimeall Exploring The Interactions Between Network Data Analysis And Security Information/Event Management
Jan. 10, 2011 3 FloCon 2011 20 John Smith Real Time Topology Based Flow Visualization
Jan. 10, 2011 3 FloCon 2011 21 George Warnagiris Cert Virtual Flow Collection And Analysis
Jan. 10, 2011 3 FloCon 2011 22 Chris Nunnery , Rhiannon Weaver , Gautam Singaraju , Brent Kang Entropy-Based Measurement Of Ip Address Inflation In The Waledac Botnet
date of conf number of days name of conf Edition conf URL talk num speaker topic slides
April 20, 2011 2 SOURCE Boston 2011 http://www.sourceconference.com/boston/ 1 Dan Guido The Exploit Intelligence Project
date of conf number of days name of conf Edition conf URL talk num speaker topic slides
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 1 Franklin Kramer Keynote - Cyber Conflicts: Challenging the Future
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 2 Itzhak Avraham Popping Shell on A(ndroid)RM Devices
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 3 Ryan Barnett XSS Street-Fight: The Only Rule Is There Are No Rules
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 4 Dionysus Blazakis The Apple Sandbox
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 5 Tom Brennan , Ryan Barnett Checkmate with Denial of Service
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 6 Andrew Case De-Anonymizing Live CDs through Physical Memory Analysis
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 7 Sean Coyne The Getaway: Methods and Defenses for Data Exfiltration
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 8 Adrian Crenshaw Identifying the true IP/Network identity of I2P service hosts
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 9 Neil Daswani Malware Distribution via Widgetization of the Web
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 10 Mariano Croce Your crown jewels online: Attacks to SAP Web Applications
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 11 Mariano Croce , Jordan Santarsieri WORKSHOP - Cyber-attacks to SAP platforms: The Insider Threat
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 12 Michael Eddington WORKSHOP - Peach Fuzzing
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 13 Marc Eisenbarth Active Exploitation Detection
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 14 Chris Gates Attacking Oracle Web Applications With Metasploit
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 15 Cassio Goldschmidt Responsibility for the Harm and Risk of Software Security Flaws
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 16 Joe Grand WORKSHOP - Hardware Reverse Engineering: Access, Analyze, and Defeat
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 17 Chris Hadnagy WORKSHOP: How to Hack Large Companies and Make Millions
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 18 Rob Havelt , Bruno Oliveira Hacking the Fast Lane: security issues with 802.11p, DSRC, and WAVE
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 19 Vincenzo Iozzo , Giovanni Gola Stale pointers are the new black
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 20 Jon Larimer Beyond AutoRun: Exploiting software vulnerabilities with removable storage
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 21 Tarjei Mandt Kernel Pool Exploitation on Windows 7
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 22 Laurent Oudot Inglourious Hackerds: Targeting Web Clients
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 23 Tom Parker Stuxnet Redux: Malware Attribution & Lessons Learned
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 24 David Perez , Jose Pico A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 25 Thomas Roth Breaking encryption in the cloud: GPU accelerated supercomputing for everyone
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 26 Eric Michaud , Jamie Schwettmann How to Steal Nuclear Warheads Without Voiding Your Xbox Warranty
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 27 Val Smith , Alexander Polyakov Forgotten World: Corporate Business Application Systems
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 28 Angelos Stavrou , Zhaohui Wang Exploiting Smart-Phone USB Connectivity For Fun And Profit
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 29 Matthieu Suiche Your cloud in my pocket
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 30 Bryan Sullivan Hey You, Get Off Of My Cloud: Denial of Service in the *aaS Era
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 31 Matthew Weeks Counterattack: Turning the tables on exploitation attempts from tools like Metasploit
Jan. 16, 2011 1 BlackHatDC 2011 https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html 32 Ralf-Philipp Weinmann The Baseband Apocalypse
date of conf number of days name of conf Edition conf URL talk num speaker topic slides
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 1 James Bidzos Panel Discussion: Update on DNSSEC: A Discussion with the Experts
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 2 Gary Mcgraw Panel Discussion: Cyber War: How We Learned to Stop Worrying and Love the Cyber Bomb
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 3 Dmitri Alperovitch Panel Discussion: Advanced Persistent Threats: War Stories from the Front Lines
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 4 Jeremiah Grossman Top Website Vulnerabilities: Trends, Business Effects and How to Fight Them
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 5 Caleb Sima Don't Teach Developers Security
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 6 Bruce Schneier The Dishonest Minority: Security as Society's Enabler
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 7 Ira Winkler How to Recruit Spies on the Internet
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 8 Rich Mogull , Chris Hoff Cloudiquantanomidatumcon: The Infra/Info-Centric Debate in the Cloud
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 9 Joseph Menn Panel Discussion: Public, Meet Private: Lessons Learned in Chasing Cyber Crooks
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 10 Jacob West , Brian Chess Panel Discussion: Extreme Makeover: Open Source Edition
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 11 Kevin Poulsen From White Hat to Black - The Curious Case of Cybercrime Kingpin, Max Vision
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 12 Alan Paller Panel Discussion: The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 13 Paul Kocher Misconceptions of Security
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 14 George Kurtz , Stuart Mcclure Hacking Exposed - Exploiting the Cloud and Virtual Machines
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 15 Brian Chess Software Security: The Big Picture
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 16 Bryan Sullivan , Michael Howard Stop Exposing Yourself: Principles of Attack Surface Analysis and Reduction
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 17 Jacob West The Evolution of Software Security Assurance and its Relevance Today
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 18 Peleus Uhley Innovation in Application Security
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 19 Chris Wysopal , Sam King Intelligence on the Intractable Problem of Insecure Software
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 20 Adrian Lane Agile Development, Security Fail
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 21 Alan Karp Making Security Decisions Disappear into the User's Workflow
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 22 James Anderson , James Christiansen Security Business Cases: Fact and Fiction in Selling Security
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 23 Hord Tipton A Changing Industry: The 2011 Global Information Security Workforce Study
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 24 Brian Sniffen Scanning the Ten Petabyte Cloud: Finding the Malware that Isn't There
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 25 Davi Ottenheimer Cloud Investigations and Forensics
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 26 Hemma Prafullchandra , Charlton Barreto Trusted IaaS
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 27 Rich Mogull Everything You Ever Wanted to Know About DLP
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 28 Bryan Sartin Behind the Verizon Business 2010 Data Breach Investigations Report
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 29 Julie Fitton Thirty Thousand Records, Four Weeks, and No Time to Lose
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 30 Michael Hall , Paul Reymann Overlooked Security Threats of Data Recovery Operations
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 31 Bruce Jones A Practical Approach to Risk Management
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 32 Miles Edmundson The Psychology of Risk: Why Understanding Human Behavior is Essential
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 33 Caroline Wong Security Metrics: A Beginner's Guide
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 34 Alex Hutton , Josh Corman Metrics are Bunk!?: The Zombie Apocalypse, Baseball, and Security Metrics
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 35 Bob Russo Payment Data in 2011 and Beyond: Investigating Updates to the PCI Standards
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 36 Abhilash Sonwane Mapping an Organization's DNA Using Social Media
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 37 Cliff Baker , Trevor Horwitz Red Pill, Blue Pill – Prescriptions for Curing Compliance Complexity
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 38 Eric Lybeck , Rick Siebenaler Building a Global Privacy Program Leveraging Binding Corporate Rules
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 39 Lukas Hasik , Jiri Sejtko Browsing Known Sites is Safe – True or False?
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 40 Gopinath K.n. Wireless Vulnerabilities in the Wild: View from the Trenches
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 41 Andrew Brandt Why Johnny Can't Navigate Away from this iFrame: A PHP Malware Primer
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 42 Gerhard Eschelbeck , David Compton Aspire to a Network Free of Malicious Programs
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 43 Dawn Cappelli , Joji Montelibano Combat IT Sabotage: Technical Solutions from the CERT Insider Threat Lab
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 44 Peter Robinson , Sean Parkinson TLS Renegotiation Vulnerability
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 45 Denis Maslennikov Lightning Round: Mobile Security the Ugly Truth
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 46 Adam Meyers BlackBerry Security FUD Free
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 47 Janice Neiderhofer Luring Your Prey: The Art of Effectively Communicating with a Cyber Predator
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 48 Henry Stern , Patrick Peterson A Study on The State of Web Security
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 49 Neil Daswani , Lars Ewe Drive By Downloads: How to Avoid Getting a Cap Popped in Your App
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 50 James Lyne How Malware Authors Are Winning the War
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 51 David Willson , Benjamin Tomhave Ethical Considerations Involving the Use of Force in Cyberspace
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 52 Alan Paller , Karen Evans The U.S. Cyber Challenge: Developing the Next Generation of Cyber Guardians
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 53 Keith Mularski , Jeff Bardin The Machinery of Cybercrime: Uncut and Uncensored!
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 54 Phillip Hallam-baker The Manchurian Device Problem
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 55 William Cheswick Rethinking Passwords
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 56 Peter Gutmann PKI, Lemon Markets and Lemonade
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 57 Eric Chabrow , David Matthews Government Information Security: The State of the Union
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 58 Ben Rothke What Happens in Vegas Goes on YouTube: Security and Corporate Social Networks
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 59 Frank Nagle Loose Lips Sink Networks - Is Social Networking Making Your Network Insecure?
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 60 Markus Jakobsson , Richard Chow Trends in Mobile Authentication and Fraud Deterrence
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 61 Jeff Bardin Awareness for the ADD and ADHD Society
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 62 Eric Ogren Is it Time to Put HIPS in the Recycle Bin?
Feb. 15, 2011 3 RSA 2011 http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers 63 Jim Cebula Risk and Resilience: Considerations for Information Security Risk Assessment