HITBSecConf Malaysia 2009 Oct. 5, 2009 to Oct. 8, 2009, Kuala Lampur, Malaysia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Freeing Sisyphus: Declaratively Addressing Web Security Issues Lucas Adamski Freeing Sisyphus: Declaratively Addressing Web Security IssuesPresentation AbstractAnother security conference, and another batch of cross-site ... Security Web
Aprs/Ham Radio Malaysian Service APRS/HAM RadioPresentation Abstract1. Introduction to Amateur Radio, History of Ham Radio in Malaysia2. APRS Introduction3. ... Security Wireless
Attacking Interoperability Mark Dowd Attacking InteroperabilityPresentation AbstractInteractive content has become increasingly powerful and more flexible over the last few ... Security Exploitation Browser
Ekimono: A Malware Scanner For Virtual Machines Nguyen Anh Quynh eKimono: A Malware Scanner for Virtual MachinesPresentation AbstractThis talk presents eKimono, a new malware scanner ... Security Malware
How Low Will Malware Go? Nishad Herath How Low will Malware Go?Presentation AbstractImagine the next worm that establishes its C&C network by ... Security Malware
Making Software Dumber Tavis Ormandy Making Software DumberPresentation AbstractWe describe our experience with a system designed to select optimal input ... Security Fuzzing Development Testing
The Art Of Network Forensics Lee Chin Sheng The Art of Network ForensicsPresentation AbstractNetwork forensics is defined as the capture, recording, and analysis ... Security Forensics
Offensive Cloud Computing With Hadoop And Backtrack Justin Lundy Offensive Cloud Computing with Hadoop and BacktrackPresentation AbstractThis talk demonstrates offensive cloud computing techniques using ... Security Cloud
Side Channel Analysis On Embedded Systems Job de Haas Side Channel Analysis on Embedded SystemsPresentation AbstractSide-channel analysis for years has had its main application ... Security Analysis
Clobbering The Cloud Haroon Meer Clobbering the CloudPresentation AbstractCloud Computing dominates the headlines these days but like most paradigm changes ... Security Cloud
Lock Picking Lab – Focus On Asean Locks Deviant Olam Lock Picking Lab – Focus on ASEAN LocksPresentation AbstractAbout Deviant Olam Security
Having Fun With Atms & Hsms Dimitrios Petropoulos Having fun with ATMs & HSMsPresentation AbstractThe cornerstone of every bank’s ATM network is a ... Security Risk Compliance
Security In-Depth For Linux Software Chris Evans Security In-Depth for Linux SoftwarePresentation AbstractIn many designs, the slightest error in the source code ... Security Access
Sniff Keystrokes With Lasers/Voltmeters – Side Channel Attacks Using Optical Sampling Of Mechanical Energy And Power Line Leakage Andrea Barisani Sniff Keystrokes With Lasers/Voltmeters – Side Channel Attacks Using Optical Sampling Of Mechanical Energy And ... Security Others Community
Defeating Software Protection With Metasm Alexander Gazet Defeating Software Protection with MetasmPresentation AbstractMetasm, is a binary manipulation framework (disassembly, compilation, executable formats ... Security
Tba Julian Assange About WikileaksWikileaks is a website that publishes anonymous submissions and leaks of sensitive governmental, corporate, ... Security Anonymity
The Bad Guys Are Winning: So Now What? Ed Skoudis The Bad Guys are Winning: So Now What?Presentation AbstractWith the continual release of zero-day exploits, ... Security Privacy Malware Phishing
Modern Day Robin Hoods? Rop Gonggrijp Modern Day Robin Hoods?Presentation AbstractDo you have the right to encrypt your data? Can telcos ... Security Access
Hardware Is The New Software Joe Kingpin Hardware is the New SoftwarePresentation AbstractSociety thrives on an ever increasing use of technology. Electronics ... Security Access