SourceSeattle 2012 Sept. 13, 2012 to Sept. 14, 2012, Seattle, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
The Future of Automated Malware Generation | Stephan Chenette | "Cyber-criminals have had back-end infrastructures equivalent to Virus Total to test if malware is effective ... | |
Building Dictionaries and Destroying Hashes Using Amazon EC2 | Steve Werby , Randy Todf | "By aggregating and creating new dictionaries and manipulating them to guess plaintext and hashed passwords ... | |
Leveraging Collective Intelligence to Combat Cyber Crime - Panel | Rod Rasmussen , Alex Bobotek , Ken Kinloch | Whether by computer, tablet or mobile phone, the headlines these days are filled with the ... | |
Proactive Defense | Adam Meyers | By nature, computer network defenders tend to be very reactive - an IDS alert triggers ... | |
Browser extensions: The Backdoor to Stealth Malware | Julien Sobrier | Browser extensions are widely used, yet users underestimate just how much control these pieces of ... | |
RESTful Services, The Web Security Blind Spot | Ofer Shezaf | As a light weight alternative to web services, RESTful services are fast becoming a leading ... | |
Next Generation Android Exploiation using AFE | Aditya Gupta | Android Market allows any app developer to develop and publish its app to the Android ... | Security |
Unified Communications: Information Loss Through the Front Door | Rachel Engel , Jason Bubolz | What if you scanned your external network and found an open LDAP listener offering access ... | |
Mapping and Evolution of Android Permissions | Zach Lanier | The Android Open Source Project provides a software stack for mobile devices. The provided API ... | |
Scoring PDF structure to detect malicious files | Rodrigo Montoro | Today PDF is a big attack vector for malware. Antivirus/Client-side protections are struggling to detect ... | |
Advanced Exploitation of Mobile/Embedded Devices: The ARM Microprocessor | Stephen Ridley | We are currently entering into a "post-PC" exploitation environment where threats to mobile devices are ... | Security |
Lessons Of Static Binary Analysis | Christien ( Dildog ) Rioux | "Ever wanted to know more about how static binary analysis works? It's complicated. Ever want ... | |
Why Developers and Vulnerability Researchers Should Collaborate | Karthik Raman , David Rees | In a software company, the roles of a software developer and a vulnerability researcher might ... | |
The Base Rate Fallacy: Information Security Needs To Understand This. | Patrick Florer , Jeff Lowder | A base rate is the prevalence of an item of interest in a population. In ... | |
Just Another Day at the Office... September 11, 2001, The White House | Tony Rucci | This will be the first time speaking publicly about my role as the Counterintelligence Operations ... | Security |
Data Breach: Let the Finger Pointing Begin! | William Cook | "Whether it's a malicious Flame attack, a Trojan enhanced Simurgh compromise or a compromise caused ... | |
Journey To The Clouds: Maturity, Agility, Risk & Trust | Bryan k. Fite | We will explore the evolution of Information Security from its technology focused roots to Outsourcing ... | |
The Interim Years of Cyberspace - Security in a Domain of Warfare | Robert E. Lee | Cyberspace is the fifth and newest domain of warfare, yet the domain was used by ... | |
Security Lessons From Star Wars | Adam Shostack | Shostack will examine the traditional threats against which we fight and follow Darth Vader\'s advice ... | Security |