BlueHat 2007 Oct. 14, 2007 to Oct. 15, 2007, Redmond, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Cellular Safety! | Sean Hunt | The growth of cellular and mobile technologies has expanded at phenomenal rates over the past ... | Security |
Wabisabilabi: The Exploit Marketplace Project | Roberto Preatoni | Three days after its launch, the Wabisabilabi project attracted the world's attention. For the good ... | Security |
Malware, Isolation And Security Boundaries: Itís Harder Than It Looks | Mark Russinovich | Just about everyone thinks they know the solution to the malware problem, whether it is ... | Security |
Automated Application Security Testing Models With Cool Wpf Visualizations | Shane ( K2 ) Macaulay | This talk demonstrates security visualization at the systems layer to depict an instrumented application context. ... | Security |
Microsoftís Circle Of Life: Patch To Exploit | Lurene ( pusscat ) Grenier | This talk will outline a simple, repeatable procedure for turning Microsoft Tuesday patch releases into ... | Security |
Black Ops 2007: Dns Rebinding Attacks | Dan Kaminsky | Part of the design of the web allows browsers to collect and render resources across ... | Security |
Office 0-Days And The People Who Love Them! | Robert Hensing | In 2006, MSRC received an unprecedented number of vulnerability reports for Office 2003. Some of ... | Security |
Subverting Windows Ce Kernel For Fun And Profit | Petr Matousek | In this talk, the author presents various ways to subvert Windows CE kernel to hide ... | Security |
Structural Classification Of Malware | Thomas ( Halvar Flake ) Dullien | Malware authors are changing. In the past, their motivation was fame, nowadays it is mostly ... | Security |
Mobile And Embedded Security - The Elephant Under The Carpet | Ollie Whitehouse | Ollie Whitehouse from Symantec will present a matter-of-fact look at Windows Mobile 5 & 6 ... | Security |
An External Perspective To Extending Microsoftís Phoenix Framework | Matt Miller | An understanding of Microsoft's Phoenix framework will soon be a requirement for those involved in ... | Security |
Fuzzing Sucks! | Pedram Amini , Aaron Portnoy | Face it, fuzzing sucks. Even the most expensive commercial fuzzing suites leave much to be ... | Security |
Death By 1,000 Cuts | Robert ( Rsnake ) Hansen | Web application security is the new security frontier. Firewalls, IDSs, and IPSs have become all ... | Security |
Emerging Mobile Security Problems, Or How We Learned To Stop Worrying And Love Windows Mobile | Kevin Mahaffey , John Hering | Mobile devices have become a valuable attack target: they store sensitive information, perform financial transactions, ... | Security |
Your Tamper-Resistant Hardware Makes A Great Sport For Hackers | Andrew ( bunnie ) Huang | The worst way to keep a secret is to copy it a million times and ... | Security |
Your Underground Vulnerability Economy | Rob Thomas | This talk discusses the underground economy, the engine that fuels and is fueled by the ... | Security |
Security Trade-Offs And Pitfalls In Virtualized Platforms | Jeff ( Rain Forrest Puppy ) Forristal | Depending on who you ask, platform virtualization (a la Virtual Server, VMWare, Xen) is useful, ... | Security |
Breaking And Breaking Into Microsoft Security Tools | David Maynor , Robert Graham | Ever read a story about a remote code execution vulnerability in an AV vendor and ... | Security |