HackLu 2011 Sept. 19, 2011 to Sept. 21, 2011, Luxembourg,Luxembourg
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote - Human After All | Pierre-marc Bureau | To properly understand malware, it is crucial to understand the motivations and tactics of malware ... | |
Security Problems in operational navy systems, Industrial point of view | Patrick Hebrard , Laurent Comte | Most of navy systems (on a battleship or navy base operational centre) integrate harware/software civilian ... | |
Steal Everything, Kill Everyone, Cause Total Financial Ruin." (Or how I walked in & misbehaved) | Jayson E. Street | This is not a presentation where I talk about how I would get in or ... | |
Fruit: Why You So Low? | Metlstorm | New Zealand exports a lot of things; milk products, tasty tasty lamb, and the eponymous ... | |
Project Ubertooth: Building a Better Bluetooth Adapter | Michael Ossmann | The off-the-shelf Bluetooth adapters didn't do what I wanted, so I built my own. This ... | |
Chip & PIN is definitely broken | Andrea Barisani , Daniele Bianco | The EMV global standard for electronic payments is widely used for inter-operation between chip equipped ... | |
Milking the Internet: case studies of emerging cybercrime threats | Fyodor Yarochkin | This presentation will cover emerging internet threats and explore the financial motives and mechanisms behind ... | |
Extending Scapy by a GSM Air Interface and Validating the implementation Using Classical and Novel Attacks | Laurent 'kabel' Weber | This presentation describes the enhancement of scapy, the powerful interactive packet manipulation program, by the ... | |
Abusing the Windows WiFi native API to create a Covert Channel | Ezequiel D. Gutesman , Andres Blanco | Communications over wireless channels have been perfectioned in the last years mainly improving performance and ... | |
Locating a GSM phone in a given area without user consent. | Iosif Androulidakis | Is it possible to locate a GSM phone in a given area without alerting its ... | |
On the Secure Software Development in Early Stages within UML Profiles | Ricardo J. Rodrguez | Security deals with confidentiality, authorisation, authentication, availability and integrity non-functional properties (NFPs). Unfortunately, security modelling ... | |
Linux thread injection - The jugaad way | Aseem "@" Jakhar | Windows malware conveniently uses the CreateRemoteThread() api to delegate critical tasks inside of other processes. ... | |
SniffJoke project | Claudio Agosti | A sniffer or a NIDS works collecting passively internet traffic. This traffic is grabbed as ... | |
Lockpicking Talk | Walter Belgers | N/A | |
How Visualization makes it possible | Sebastien Tricaud | Handling huge amount of data is difficult. Organizations have been deploying Firewall, SIEMS, log management ... | |
OAuth and OpenID - Securing the Insecure | Khash Kiani | There are a number of open protocol and standards designed to deliver mechanisms for enabling ... | |
Weaponizing the Smartphone: Deploying the Perfect WMD | Kizz Myanthia | The acceptance and integration of mobile phones, specifically smartphones, into our everyday life has allowed ... | |
Critical infrastructure, a weapon of mass destruction? | Francois Gaspard , Fred Raynal | PLC, DCS, OPC, SCADA, Modbus, Stuxnet, we all hear about these terms quite often nowadays. ... | |
Results of a Security Assessment of the Internet Protocol version 6 (IPv6) | Fernando Gont | The IPv6 protocol suite was designed to accommodate the present and future growth of the ... | |
The ArDrone corruption | Eddy Deligne , Olivier Ferrand | The goal of the demonstration is to corrupt, both the communication canal UAV/pilot, and the ... | |
Rootkits and Trojans on Your SAP Landscape | Ertunga Arsal | SAP systems are the heart of many enterprises. Most critical business functions run on SAP ... | |
Scaling up DoS: taking out your mobile phone, bank and internetz | Philippe Langlois | Founder of P1 Security and Senior Researcher for Telecom Security Task Force. Philippe Langlois has ... |