Infiltrate 2014 May 15, 2014 to May 16, 2014, Miami,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Red Team Deadwood: Why Red Teams are Useless Bill Arbaugh N/A
Life at Both Ends of the Barrel: An NSA Targeting Retrospective Richard "dickie" George N/A
Hacking US Traffic Control Systems Cesar Cerrudo Probably many of us have seen that scene from "Live Free or Die Hard" (Die ...
SQL Injections to MIPS Overflows: Part Deux Zachary Cutlip A while back, I showed how to combine SQL injection vulnerabilities with MIPS Linux buffer ...
Researching Android Device Security with the Help of a Droid Army Joshua j. Drake In the last few years, Android has become the world's leading smart phone operating system. ...
Legacy Sandboxing: Escaping IE11 Enhanced Protected Mode James Forshaw In June 2013 Microsoft started the first of their new bug-bounty programs, focusing on finding ...
Ghosts of Christmas Past: Fuzzing Language Interpreters using Regression Tests Sean Heelan In this talk I will discuss an approach to fuzzing language interpreters that has found ...
Python, Deflowered: Shangrila! Christos Kalkanis The use of dynamic languages in sophisticated persistent frameworks is not new. In the past, ...
A Curious Cyber War: Business Owners vs Investors Suzanne E. Kecmer This presentation will discuss recent market and valuation trends of offensively-focused cyber companies. The audience ...
Exploiting Hyper-V Matthias Luft , Felix Wilhelm In this presentation we will describe our research on the architecture and security of the ...
Fuzzing, Reversing and Maths Pedro Guillén Núñez , Josep Pi Rodriguez We want to presentate several 0days using fuzzing and reverse engineering and maths. 1 Critical ...
Analytics, and Scalability, and UEFI exploitation! Oh My! Teddy Reed We use UEFI and commodity PC manufacturer "firmware" as a use case for vulnerability discovery ...
Digital Rights Management for Malicious Software Paul Royal To process and extract intelligence from large volumes of suspect executables collected in networks each ...