t2 2010 Oct. 28, 2010 to Oct. 29, 2010, Helsinki, Finland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: New Network Security Threat Category Olli-pekka Niemi , Antti Levomäki Intrusion Prevention capable network security devices are used to protect vulnerable hosts from remote exploits. ... Keynote
Attacking Atms: Putting The Art Into Smart Cards Rafael Dominguez Vega The use of smart cards has become part of our daily routine, when cashing money ... Hardware Reverse Engineering Hardware General
Hazards Of Duke / Java Sandbox (In)Security Sami Koivu Others Security
How To Notice When You Are Re-Owned Halvar Flake This session is going to discuss our research in the area of automated malware clustering ... Security Others
Practical Exploitation Of Modern Wireless Devices: Keykeriki V2 Thorsten Schröder Wireless keyboards have been target to dedicated attacks by Philipp Schroedel, Max Moser and Thorsten ... Security Wireless
0Wning The Datacenter Using The Cisco 7000-Series Switch - Nx-Os Insecurity George Hedfors Banks and large corporations are constantly upgrading their infrastructure. One of the latest additions to ... Network Penetration Web
The Threat In Your Pocket? Nils We carry mobile phones with us everywhere we go and many people trust them to ... Security Others
Hacking Printers For Fun And Profit - Now, Do You Trust Your Printer Anymore? Andrei Costin The use of smart cards has become part of our daily routine, when cashing money ... Hardware Reverse Engineering Hardware General
Some Things That Every Vulnerability Developer Should Know Halvar Flake This session will discuss a number of techniques that, while public, have not received the ... Security Exploitation Development
Hacking Femtocells Kevin Redon , Ravishankar Borgaonkar Femtocell is emerging as a new technology to enhance third generation (3G) coverage and to ... Others Security
Cost Efficient Fuzzing Techniques For Fun And Profit Aki Helin OUSPG has been searching, finding and responsibly disclosing issues in various programs, appliances and protocols ... Fuzzing
Solving The T2'10 Challenge Timo Hirvonen Security Others
Ruby On Rails Security: Understanding The Rails Developers Mind-Set Matti Paksula Ruby on Rails is a mature web development framework that is being used more and ... Security Others
Real World Code Signing Abuse Today Jarno Niemelä Code signing systems are gaining more attention and becoming ever more important part of computer ... Development Security