CanSecWest 2010 March 24, 2010 to March 26, 2010, Vancouver, Canada
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Internet Nails | Marcus Ranum | Beginning the conference was Marcus Ranum, from Tenable Network Security. If you would like to ... | |
Under The Kimono Of Office Security Engineering | Tom Gallagher , David Conger | Tom and David from the Microsoft Office team presented that large and coordinated effort Microsoft ... | |
Seh Overwrite And Its Exploitability | Shuichiro Suzuki | Shuichiro, who works for Fourteenforty, demonstrated methods to bypass DEP using the Structured Exception handler ... | |
There'S A Party At Ring0, And Yore Invited | Julien Tinnes , Tavis Ormandy | Julien and Tavis of Google shared with us the research they have been doing into ... | |
Babysitting An Army Of Monkeys: An Analysis Of Fuzzing 4 Products With 5 Lines Of Python | Charlie Miller | Whether you agree with Charlie's philosophy or not, you can always depend on him for ... | |
Sharereing Is Caring | Thomas ( Halvar Flake ) Dullien , Sebastian Porst | Halvar and Sebastian are researchers at Zynamics GMBH, founded by Halvar in 2004. They announced ... | |
Cisco Ios Exploitation With Iodide | Andy Davis | When he discovered that his employer, KPMG, needed to investigate vulnerabilities in Cisco's IOS-based routers, ... | |
Random Tales From A Mobile Phone Hacker | Collin Mulliner | Collin was enthusiastic about his topic and showed how, with a little innovation, you can ... | |
Legal Perspectives Of Hardware Hacking | Jennifer Granick | Jennifer is a lawyer for the Electronic Frontier Foundation. Her presentation focused on the legal ... | |
Stuff We Don'T Want On Our Phones: On Mobile Spyware And Pups | Jimmy Shah | Jimmy works for McAfee and the heart of his presentation this year was the increasing ... | |
Practical Exploitation Of Modern Wireless Devices | Thorsten Schroeder , Max Moser | Thorsten presented their research on wireless keyboards and how to both spy on them and ... | |
Rfid Hacking At Home | Melanie Rieback | Dr. Rieback does research on RFID technologies at Vrije Universiteit in Amsterdam, Holland. She demonstrated ... | |
Advanced Mac Os X Physical Memory Analysis | Matthieu Suiche | The presentation at CanSecWest focused on new tools he is creating to allow advanced memory ... | |
Full Process Analysis And Reconstitution Of A Virtual Machine From The Native Host | James Butler | In the incident response and forensics business, James is a household name. He works for ... | |
Through The Looking Glass: An Investigation Of Malware Trends And Response Activity | Jeff Williams | Jeff is the Director of the Microsoft Malware Protection Center. If you are familiar with ... | |
The Jedi Packet Trick Takes Over The Deathstar: Taking Nic Backdoors To The Next Level | Arrigo Triulzi | Arrigo presented on his methods for taking over a theoretical firewall running 2 Broadcom NICs ... |