SourceSeattle 2012 Sept. 13, 2012 to Sept. 14, 2012, Seattle, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Future of Automated Malware Generation Stephan Chenette "Cyber-criminals have had back-end infrastructures equivalent to Virus Total to test if malware is effective ...
Building Dictionaries and Destroying Hashes Using Amazon EC2 Steve Werby , Randy Todf "By aggregating and creating new dictionaries and manipulating them to guess plaintext and hashed passwords ...
Leveraging Collective Intelligence to Combat Cyber Crime - Panel Rod Rasmussen , Alex Bobotek , Ken Kinloch Whether by computer, tablet or mobile phone, the headlines these days are filled with the ...
Proactive Defense Adam Meyers By nature, computer network defenders tend to be very reactive - an IDS alert triggers ...
Browser extensions: The Backdoor to Stealth Malware Julien Sobrier Browser extensions are widely used, yet users underestimate just how much control these pieces of ...
RESTful Services, The Web Security Blind Spot Ofer Shezaf As a light weight alternative to web services, RESTful services are fast becoming a leading ...
Next Generation Android Exploiation using AFE Aditya Gupta Android Market allows any app developer to develop and publish its app to the Android ... Security
Unified Communications: Information Loss Through the Front Door Rachel Engel , Jason Bubolz What if you scanned your external network and found an open LDAP listener offering access ...
Mapping and Evolution of Android Permissions Zach Lanier The Android Open Source Project provides a software stack for mobile devices. The provided API ...
Scoring PDF structure to detect malicious files Rodrigo Montoro Today PDF is a big attack vector for malware. Antivirus/Client-side protections are struggling to detect ...
Advanced Exploitation of Mobile/Embedded Devices: The ARM Microprocessor Stephen Ridley We are currently entering into a "post-PC" exploitation environment where threats to mobile devices are ... Security
Lessons Of Static Binary Analysis Christien ( Dildog ) Rioux "Ever wanted to know more about how static binary analysis works? It's complicated. Ever want ...
Why Developers and Vulnerability Researchers Should Collaborate Karthik Raman , David Rees In a software company, the roles of a software developer and a vulnerability researcher might ...
The Base Rate Fallacy: Information Security Needs To Understand This. Patrick Florer , Jeff Lowder A base rate is the prevalence of an item of interest in a population. In ...
Just Another Day at the Office... September 11, 2001, The White House Tony Rucci This will be the first time speaking publicly about my role as the Counterintelligence Operations ... Security
Data Breach: Let the Finger Pointing Begin! William Cook "Whether it's a malicious Flame attack, a Trojan enhanced Simurgh compromise or a compromise caused ...
Journey To The Clouds: Maturity, Agility, Risk & Trust Bryan k. Fite We will explore the evolution of Information Security from its technology focused roots to Outsourcing ...
The Interim Years of Cyberspace - Security in a Domain of Warfare Robert E. Lee Cyberspace is the fifth and newest domain of warfare, yet the domain was used by ...
Security Lessons From Star Wars Adam Shostack Shostack will examine the traditional threats against which we fight and follow Darth Vader\'s advice ... Security