HITBSecConf Malaysia 2013 Oct. 14, 2013 to Oct. 17, 2013, Kuala Lumpur,Malaysia
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Diving Into IE 10?s Enhanced Protected Mode Sandbox | Mark Vincent Yason | ||
Hacking Corporations Using Unconventional Chained Exploits | N/a | This presentation will cover several examples of unconventional chained exploits used in real-world penetration tests; ... | |
20 Ways to Secure Boot | Job de Haas | This talk presents an overview of all things that can go wrong when developers attempt ... | |
Digging Deeper into Aviation Security | Hugo Teso | Still focusing on the same target, aircrafts, this presentation we will detail and exploit new ... | |
TraceDroid: A Fast and Complete Android Method Tracer | Victor Veen | Recent reports show that Android is responsible for 92% of all known mobile malware. From ... | |
Facebook OSINT: It’s Faster Than Speed Dating | Keith Lee , Jonathan Werrett | The Facebook Graph has been a boom for Open Source Intel (OSINT). Since being released ... | |
TCP Idle Scans in IPv6 | N/a | With the slowly approaching upgrade of IPv4 with IPv6, one will not be able anymore ... | |
Cracking and Analyzing Apple’s iCloud Protocols | Vladimir Katalov | Apple’s iCloud was meant to provide ease of use and peace of mind should your ... | |
Demystifying Game Console Security: Over 10 Years of Ownage Unraveled | Peter ‘@bl4sty’ Geissler | Are you interested to learn about the delicate hacks and tricks that go on behind ... | |
KEYNOTE 2 – Bringing Social to Security | Joe Sullivan | Joe talked at HITB 2011 (Amsterdam) about the importance of security teams innovating constantly to ... | |
Sending Out An SOS: Session Origin Security | Mike Shema | Cross Site Request Forgery (CSRF) remains a significant threat to web apps and user data. ... | |
RFIDler: A Software Defined RFID Reader/Writer/Emulator | Adam ( Major Malfunction ) Laurie | Software Defined Radio has been quietly revolutionising the world of RF. However, the same revolution ... | |
Defeating Signed BIOS Enforcement | Xeno Kovah , Corey Kallenberg , John Butterworth | The integrity of the BIOS is paramount to the security of the platform. Research such ... | |
Owning a Cisco VOIP Environment: Exploiting the Call Manager | Francisco | Cisco VOIP environments are widely deployed. In this presentation we will demonstrate how it is ... | IncludeThinkstScapes |
SHAttered Dreams | Joshua ‘@p0sixninja’ Hill | WIn the past 5 years, since Apple has unleashed the iPhone to the world, there ... | |
Using Visualization to Analyze Malware | Wes Brown | Last year’s Supercomputing and Malware talk had visualizations that showed diagrams of relationships between hosts ... | |
Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions | Andy Davis | Embedded systems are everywhere, from TVs to aircraft, printers to weapon control systems. As a ... | |
Practical Attacks Against Encrypted VoIP Communications | Dominic Chell , Shaun Colley | Due to the often-sensitive nature of VoIP calls, it is well understood that packets in ... | IncludeThinkstScapes |
Using Online Activity as Digital DNA to Create a Better Spear Phisher | Joaquim Espinhara , Ulisses Albuquerque | Every day we produce tons of digital breadcrumbs through our activities in online services – ... | |
Android DDI: Dynamic Dalvik Instrumentation of Android Applications and Framework | Collin Mulliner | As application security becomes more important on Android we need better tools to analyze and ... | IncludeThinkstScapes |
Hunting for OS X Rootkits in Memory | Cem Gurkok | The OS X Kernel has been increasingly targeted by malicious players due to the shrinking ... | |
Under the Hood: How Actaeon Unveils Your Hypervisor | Mariano Graziano , Andrea Lanzi | In recent years virtualization has become really popular and used everywhere, in the domestic installations ... | |
Hey Captain, Where’s Your Ship? Attacking Vessel Tracking Systems for Fun and Profit | Marco Balduzzi , Kyle Wihoit , Alessandro Pasta | In recent years, automated identification systems (AISes) have been introduced to enhance vessels tracking and ... | |
KEYNOTE 1 – Cognitive Injection: Reprogramming the Situation-Oriented Human OS | Andy Ellis | It’s a trope among security professionals that other humans – mere mundanes – don’t “get” ... | |
Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis | Rahul Sasi | With the rise in number of targeted attacks against government and private companies, there is ... | |
How Apple Can Read Your iMessages and How You Can Prevent It | Cyril ‘@pod2g’ , Gg | Apple’s Commitment to Customer Privacy is available online since the brand appeared in the PRISM ... | |
Trusted Friend Attack: When Guardian Angels Strike | Ashar Javad | In this paper, we survey “forgot your password” functionality of fifty popular social networks and ... | |
Tales from iOS 6 Exploitation and iOS 7 Security Changes | Stefan Esser | During SyScan Singapore 2013 lots of innocent iOS vulnerabilities have been murdered. However one of ... | |
The Forger’s Art: Exploiting XML Digital Signature Implementations | James Forshaw | Many security critical systems rely on the correct implementation of the XML Digital Signature standard ... | |
Thawting Evil Maid Attacks: Physically Unclonable Functions for Hardware Tamper Detection | Ryan Lackey , Eric Michaud | Increasingly, users and their computing hardware are exposed a range of software and hardware attacks, ... | |
Tracking and Characterizing Botnets Using Automatically Generated Domains | Stefano Zanero | Modern botnets rely on domain-generation algorithms (DGAs) to build resilient command-and-control infrastructures that are difficult ... | |
Lost in Translation | Luiz 'effffn' Eduardo , Joaquim Espinhara | We all know, English has been the universal language for several years now. Companies have ... |