PacSec 2014 Nov. 12, 2014 to Nov. 13, 2014, Tokyo,Japan

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Internet voting and signing legally binding documents over the Internet Harri Hursti , Margaret Macalpine Internet Voting initiatives are discussed around the world and the common claim made is that ...
Message Queue (MQ) Vulnerabilities Georgi Geshev Message Queueing concepts are well established in enterprise environments which are already known to be ... IncludeThinkstScapes
Cloud Security at Scale Benjamin Hagen Cloud computing is all the rage, but few organizations have really thought about what security ...
BadUSB - On accessories that turn evil Karsten Nohl USB has become so commonplace that we rarely worry about its security implications. USB sticks ...
Forging the USB armory Andrea Barisani Inverse Path recently introduced the USB armory project (http://inversepath.com/usbarmory), an open source hardware design, implementing ...
Detecting BGP hijacks in 2014 Guillaume Valadon , Nicolas Vivet The main goal of this talk is to raise awareness of routing security issues by ...
TENTACLE: Environment-Sensitive Malware Palpation Kenji Aiko , Yosuke Chubachi Recently, a malware is constantly growing which forces malware analyst in hard work. An automated ...
Windows Kernel Graphics Driver Attack Surface Ilja van Sprundel Ever wondered about the attack surface of graphics drivers on Windows? Are they similar to ...
Hey, we catch you - dynamic analysis of Android applications Wenjun Hu During dynamic analysis period of Android malware, one core problem is how to trigger as ...
An Infestation of Dragons: Exploring Vulnerabilities in the ARM TrustZone Architecture Nathan Keltner , Josh m0nk Thomas , Charles Holmes ARM TrustZone is being heavily marketed as a be all solution for mobile security. Through ...
Root via SMS: 4G access level security assessment Sergey Gordeychik , Alexander Zaytsev Having developed a test set, we started to research how safe it is for clients ...