Area41 2014 June 2, 2014 to June 3, 2014, zurich,switzerland
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote | Halvar Flake | N/A | |
Retro-Arcade Hacking | Crashtest | Old school arcade games were awesome on all aspects: games, hardware, piracy, protections. Here is ... | |
Schizophrenic Files – A file that thinks it's many | Gynvael Coldwind , Ange ( ange4771 ) Albertini | As file format specs leave room for interpretation and sometimes are misunderstood or ignored by ... | |
Painting a company red and blue | Ian Amit | "Say red team one more time. I dare you. I double dare you. The term ... | |
Password Hashing Competition - Status Quo | Jean-Philippe Aumasson | The Password Hashing Competition (PHC) is starting! We will present the project and the submissions ... | |
Vortessence - Automating memory forensics | Endre Bangerter , Ramona Cioccarelli , Beni Urech | Memory forensics is a key technique for detecting and analyzing malware and related attack tools. ... | |
Applying science to eliminate 100% of buffer overflows | Andreas Bogk | Violation of memory safety is still a major source of vulnerabilities in everyday systems. This ... | |
Curing A 15 Year Old Disease | Marion Marschalek , Juriaan Bremer | Visual Basic P-code executables have been a pain for a digital eternity and even up ... | |
Finux's Historical Tour Of IDS Evasion, Insertions, and Other Oddities | Arron "finux" Finnon | Roll up, Roll up, my Lords, Ladies and Gentleman, come see the bizarre and wondrous ... | |
Attacker Ghost Stories: Mostly Free Defenses That Gives Attackers Nightmares | Rob Fuller | This talk was originally titled “I'm tired of defenders crying”, but thought better of it. ... | |
International Vulnerability Purchase Program (IVPP) | Stefan Frei | The continued discovery of new software vulnerabilities and their abuse by criminals and governments is ... | |
Why .NET needs MACs and other serial(-ization) tales | Alexandre Herzog | "What is the story behind Microsoft's patches MS13-067 (SharePoint) and MS13-105 (Outlook Web Access)? What ... | |
Obfuscator-LLVM – Software Obfuscation for the Masses | Pascal Junod | Resistance to software reverse-engineering is a challenging discipline that has been explored for decades. In ... | |
Completely Destroying Education and Awareness Programs | Dave Kennedy | Education and Awareness has become a huge focus for a number of organizations. With the ... | |
The Heatmap - Why is Security Visualization so Hard? | Raffael Marty | The extent and impact of recent security breaches is showing that current approaches to prevent ... | |
Bitcoins | Evgeny Neyolov | Bitcoin was one of the hottest topics of the past year. It is decentralized virtual ... | |
50 Shades of RED: Stories from the "Playroom" | Chris Nickerson | Ever steal a Boeing 777? How about transfer more than $400,000,000 from an account? Have ... | |
The DeforaOS Project - A journey into Operating System development and related security aspects | Pierre Pronchery | Operating System development as it is performed today is probably not headed in the right ... | |
Threat Modeling? It's not out of fashion! | Wim Remes | It's been more than a decade since Microsoft brought Threat Modeling to the attention of ... | |
Adventures in a Decade of Tracking and Consolidating Security Vulnerabilities | Marc Ruef | The talk discusses the approach, possibilities and difficulties that a vulnerability database maintainer is handling. ... | |
Android Packers: Separating from the Pack (sponsored) | Ruchna Nigam | Android malware has been around for a while now and is significant enough to bypass ... | |
iOS: Back to the Future | Raul Siles | Apple mobile devices based on the iOS platform implement multiple protection mechanisms and platform restrictions ... | |
The Art of Escape | Emmanuel Tacheau | In this presentation I will talk about targeted attacks and the nature of watering hole ... |