LayerOne 2012 May 26, 2012 to May 27, 2012, Los Angeles, USA

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
My Other Shellcode is the da Vinci Virus Frank^2 , Vyrus This talk will focus on making native code execution cool again. Bitcoin wallet grabbers, banking ...
Carpe Datum: Drinking from the espresso firehose we know as Shodan Dan Tentler Have you ever stayed up until 5am fiendishly digging around on shodan? I have. More ... Security
Selecting Features to Classify Malware Karthik Raman Polymorphic malware is a menace to modern computing and a strain business productivity. The challenge ... Security
Real Advances in Android Malware Jimmy Shah Attackers are starting to move on from simple attacks, mainly because users are starting to ... Security
Juice Jacking 101: Learning from Shenanigans Robert Rowley The concept originated on July 4th, and within a month (with some help) a ‘malicious’ ... Security
Big Bang Theory: The Evolution of Pentesting High Security Environments Joe Mccray This presentation focuses on pentesting high security environments, new ways of identifying/bypassing common security mechanisms, ... Security
Insidious Infections: Mangling with Botnets Aditya K Sood , Richard Enbody Malware is increasingly becoming aggressive with the advent of new exploitation techniques. Third Generation Botnets ...
I pwned your router. Oops. David ( VideoMan ) Bryan Embedded system market is great! They give us the power to make things happen, and ... Security
Physical Security: Bridging the Gap with Open Source Hardware John Norman This talk will be a follow-up to last year’s overview of physical access control systems ... Security
Hacking .NET(C#) Applications: The Black Arts (v2) Jon Mccoy This presentation will cover the Black Arts of making Cracks, KeyGens, Malware, and more. The ... Security
Codename Stiltwalker Jeffball , C-p , Adam Don’t let the unassuming codename fool you, this project is a sexy as it gets. ...