hashdays 2010 Nov. 5, 2010 to Nov. 5, 2010, Lucerne, Switzerland

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
The State Of (In)Security Chris Nickerson Keynote
#Days Badges And ... Somthing About Stuxnet Candid Wüest Hardware Reverse Engineering
Boire: All Your Evidence Is Belong To Us: Antiforensics And You Morgan Marquis-boire Security Forensics
Head Hacking - The Magic Of Suggestion And Perception Dale Pearson Social Engineering
Lockpicking 101 Walter Belgers Lockpicking has become very popular since information can be easily shared on the Internet and ... Hardware Reverse Engineering
Identity And Access Management - Get Your User-Accesses Under Control! Rik Van bruggen Access Control Access
Rootkits In The Real World Today Antti Tikkanen , Kimmo Kasslin Antti and Kimmo have been working closely with F-Secure's BlackLight rootkit scanning technology for five ... Rootkits
Configuration And Risk Assessment Toolkit, Metasploit Within The Enterprise (Lightning Talk) Max Moser , Philipp Schrödel The talk introduces our new open source extension for the well known Metasploit Framework, called ... Lightning Talk
No More Of The Same Bad Security: Why The Osstmm 3 Is Threatening Modern Security Practices Pete Herzog Modern security has become just a dance-off between jargon and products. Enterprises are doing what ... Compliance
Open-Source Cryptographic Libraries And Embedded Platforms Pascal Junod In this talk, we will discuss the (low-level) security of common open-source general-purpose cryptographic libraries, ... Security Others Cryptography
Osmocombb: A Tool For Gsm Protocol Level Security Analysis Of Gsm Networks Harald Welte The OsmocomBB project is a Free Software implementation of the GSM protocol stack running on ... Mobile Security Security Others
Testing The Limits Of Ev Certificates Philippe Oechslin Extended Validation certificates for TLS are more expensive and more difficult to obtain. In return ... Security Exploitation Browser
Android Application Security, The Fun Details Jesse Burns Jesse Burns, an Android security expert who has been working with the Android platform since ... Mobile Security Android
Frozencache Jürgen Pabel Cold boot attacks are a major risk for the protection that Full-Disk-Encryption solutions provide. FrozenCache ... Security Others Deep Knowledge