Area41 2014 June 2, 2014 to June 3, 2014, zurich,switzerland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Halvar Flake N/A
Retro-Arcade Hacking Crashtest Old school arcade games were awesome on all aspects: games, hardware, piracy, protections. Here is ...
Schizophrenic Files – A file that thinks it's many Gynvael Coldwind , Ange ( ange4771 ) Albertini As file format specs leave room for interpretation and sometimes are misunderstood or ignored by ...
Painting a company red and blue Ian Amit "Say red team one more time. I dare you. I double dare you. The term ...
Password Hashing Competition - Status Quo Jean-Philippe Aumasson The Password Hashing Competition (PHC) is starting! We will present the project and the submissions ...
Vortessence - Automating memory forensics Endre Bangerter , Ramona Cioccarelli , Beni Urech Memory forensics is a key technique for detecting and analyzing malware and related attack tools. ...
Applying science to eliminate 100% of buffer overflows Andreas Bogk Violation of memory safety is still a major source of vulnerabilities in everyday systems. This ...
Curing A 15 Year Old Disease Marion Marschalek , Juriaan Bremer Visual Basic P-code executables have been a pain for a digital eternity and even up ...
Finux's Historical Tour Of IDS Evasion, Insertions, and Other Oddities Arron "finux" Finnon Roll up, Roll up, my Lords, Ladies and Gentleman, come see the bizarre and wondrous ...
Attacker Ghost Stories: Mostly Free Defenses That Gives Attackers Nightmares Rob Fuller This talk was originally titled “I'm tired of defenders crying”, but thought better of it. ...
International Vulnerability Purchase Program (IVPP) Stefan Frei The continued discovery of new software vulnerabilities and their abuse by criminals and governments is ...
Why .NET needs MACs and other serial(-ization) tales Alexandre Herzog "What is the story behind Microsoft's patches MS13-067 (SharePoint) and MS13-105 (Outlook Web Access)? What ...
Obfuscator-LLVM – Software Obfuscation for the Masses Pascal Junod Resistance to software reverse-engineering is a challenging discipline that has been explored for decades. In ...
Completely Destroying Education and Awareness Programs Dave Kennedy Education and Awareness has become a huge focus for a number of organizations. With the ...
The Heatmap - Why is Security Visualization so Hard? Raffael Marty The extent and impact of recent security breaches is showing that current approaches to prevent ...
Bitcoins Evgeny Neyolov Bitcoin was one of the hottest topics of the past year. It is decentralized virtual ...
50 Shades of RED: Stories from the "Playroom" Chris Nickerson Ever steal a Boeing 777? How about transfer more than $400,000,000 from an account? Have ...
The DeforaOS Project - A journey into Operating System development and related security aspects Pierre Pronchery Operating System development as it is performed today is probably not headed in the right ...
Threat Modeling? It's not out of fashion! Wim Remes It's been more than a decade since Microsoft brought Threat Modeling to the attention of ...
Adventures in a Decade of Tracking and Consolidating Security Vulnerabilities Marc Ruef The talk discusses the approach, possibilities and difficulties that a vulnerability database maintainer is handling. ...
Android Packers: Separating from the Pack (sponsored) Ruchna Nigam Android malware has been around for a while now and is significant enough to bypass ...
iOS: Back to the Future Raul Siles Apple mobile devices based on the iOS platform implement multiple protection mechanisms and platform restrictions ...
The Art of Escape Emmanuel Tacheau In this presentation I will talk about targeted attacks and the nature of watering hole ...