HITBSecConf Amsterdam 2013 April 8, 2013 to April 11, 2013, Amsterdam, Netherlands
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
KEYNOTE 1: Embracing the Uncertainty of Advanced Hacks with Big Data Analytics | Edward J. Schwartz | N/A | Security |
Security Response in the Age of Mass Customized Attacks | Peleus Uhley , Karthik Raman | The goal of mass malware is to successfully run on as many different platforms and ... | |
Papparazi Over IP | Daniel Mende | Almost every recent higher class DSLR camera features multiple and complex access technologies. For example, ... | Security |
Windows x64: The Essentials | Didier Stevens | In this 120 minute lab session, we will touch upon important differences between 32-bit and ... | Security |
SSRF PWNs: New Techniques and Stories | Vladimir Vorontsov , Alexander Golovko | Server request forgery attacks – SSRF (Server Side Request Forgery) has been known since 2008, ... | |
Orchestrating a Fire Sale: Bringing Dutch Alarm Systems to Their Knees | Wilco baan Hofman | This will be an in-depth talk about the SIA-HS and Vebon SecIP alarm system protocols ... | Security |
Nifty Tricks and Sage Advice for Shellcode on Embedded Systems | Travis Goodspeed | This lecture presents a bunch of clever tricks that will save you time and headaches ... | Security |
Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel | Nikita Tarakanov | Each new version of Windows OS Microsoft enhances security by adding security mitigation mechanisms – ... | Security |
Defending the Enterprise the Russian Way | Fyodor Yarochkin , Vladimir borisovich Kropotov , Sergey Soldatov | N/A | |
Defeating the Intercepting Web Proxy – A Glimpse Into the Next Generation of Web Security Tools | Petko ( pdp ) D. Petkov | This presentation will give information security professionals and enthusiasts an opportunity to explore new tricks ... | Security |
Virtually Secure: Analysis to Remote Root 0day in an Industry Leading SSL-VPN Appliance | Tal Zeltzer | Today most networks present one “gateway” to the whole network – The SSL-VPN. A vector ... | Security |
Page Fault Liberation Army or Better Security Through Creative x86 Trapping | Sergey Bratus , Julian Bangert | x86 processors contain a surprising amount of built-in memory translation logic, which is driven by ... | |
LTE Pwnage: Hacking HLR/HSS and MME Core Network Elements | Philippe Langlois | Phrack and other magazines used to be full of obscure hardware and systems descriptions for ... | Security |
Hack Like it’s 2013 | Itzik Kotler | Try to imagine the amount of time and effort it would take you to write ... | Security |
Aircraft Hacking: Practical Aero Series | Hugo Teso | This presentation will be a practical demonstration on how to remotely attack and take full ... | IncludeThinkstScapes Air Traffic Control Aircraft |
Abusing Twitter’s API and OAuth Implementation | Nicolas Seriot | Since March 2013, Twitter’s new web API requires every request to be signed with OAuth. ... | Security |
How I Met Your Modem | Peter \xe2\x80\x98blasty\xe2\x80\x99 Geissler , Steven Ketelaar | The importance of software security and integrity of common embedded devices is still often overlooked ... | |
Abusing Browser User Interfaces for Fun and Profit | Rosario Valotta | As social engineering has become the dominant method of malware distribution, browsers makers started to ... | Security |
Attacking Ruby on Rails Applications | Joernchen ( joernchen ) | Ruby on Rails (RoR) is an open source web application framework based on the Ruby ... | Security |
OAuth 2.0 and the Road to XSS | Andrey Labunets , Egor Homakov | OAuth has recently become a proposed standard for web authorization, intended to solve security issues ... | |
Who Can Hack a Plug? The Infosec Risks of Charging Electric Cars | Ofer Shezaf | What could be insecure about charging an electric car? Just plug in to a power ... | Security |
Swiping Through Modern Security Features | Cyril \xe2\x80\x98@pod2g\xe2\x80\x99 , Eric \xe2\x80\x98@musclenerd\xe2\x80\x99 , David \xe2\x80\x98@planetbeing\xe2\x80\x99 Wang , Nikias \xe2\x80\x98@pimskeks\xe2\x80\x99 Bassen | he Apple product security team did an impressive job raising the resilience of the iOS ... | Exploitation IncludeThinkstScapes iOS Jailbreak |
You Can Be Anything You Want to Be: Breaking Through Certified Crypto in Banking Apps | Dennis Gamayunov , Andrew Petukhov , George Noseevich | It’s no surprise that a typical hackers professional path hits against custom crypto protocols from ... | |
Secure Coding: Web & Mobile | Jim Manico | We cannot hack or firewall our way secure. Application programmers need to learn to code ... | Security |
To Watch or Be Watched: Turning Your Surveillance Camera Against You | Artem Harutyunyan , Sergey Shekyan | “Doesn’t matter what you see, Or into it what you read, You can do it ... | |
iNalyzer: No More Blackbox iOS Analysis | Chilik Tamir | Performing security analysis of iOS applications is a tedious task – there is no source ... | Security |
Dreamboot: A UEFI Bootkit | Sebastien Kaczmarek | Unified Extensible Firmware Interface or UEFI, is the result of a common effort from several ... | Security |
System Shock: The Shodan Computer Search Engine | Dan Tentler | Heard of the Shodan Computer Search Engine? This young project scans the Internet IPv4 space, ... | Security |