HackLu 2009 Sept. 28, 2009 to Sept. 30, 2009, Luxembourg,Luxembourg

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Official opening speech Jeannot Krecke N/A
Keynote: Politically motivated Denial of Service attacks Jose Nazario The rapid growth of the Internet has been mirrored by a growing number of packet ...
New advances in Office Malware analysis Frank Boldewin Today's malware spreads mainly by exploiting browser bugs or 3rd party plugins like Flash, PDF ...
Ownage 2.0 Saumil Udayan Shah It is 2009 and the underground cyber economy is flourishing. Spam has become a lucrative ...
Sniff Keystrokes With Lasers/Voltmeters - Side Channel Attacks Andrea Barisani , Daniele Bianco TEMPEST attacks, exploiting Electro Magnetic emissions in order to gather data, are often mentioned by ...
Some Tricks For Defeating SSL In Practice Moxie Marlinspike This talk will cover some past and present vulnerabilities in SSL/TLS implementations as well as ...
PDF- Penetration Document Format Didier Stevens For several years now, vulnerabilities in PDF readers (mostly Adobe Acrobat) have been exploited to ...
Fuzzgrind: An automatic fuzzing tool Gabriel Campana Fuzzing is a testing technique that provides invalid, unexpected, or random data to the inputs ...
Perseus: A Coding Theory-based Firefox Plug-in to Counter Botnet Activity Eric Filiol , Eddy Deligne Most of the activity of botnets is based on listening and analysing hhtp stream to ...
Exploiting Delphi/Object Pascal Ilja van Sprundel this presentation is about exploiting applications written in the delphi language. the whole research behind ...
When E.T. comes into Windows Mobile 6... Cedric Halbronn Mobile devices are omnipresent in our lives in various forms: GPS, mobile phones, PDAs, etc. ...
malicious PDF origamis strike back Guillaume Delugr , Fred Raynal , Damien Aumaitre Most of people believe PDF file format is safe because it looks like a static ...
IpMorph: Unification of OS fingerprinting defeating Guillaume Prigent , Florian Vichot There currently exists tons of IP stack fingerprinting tools, that allows one to identify the ...
Peeking into Pandora's Bochs - instrumenting a full system emulator to analyse malicious software Lutz Bhne Today, malicious software (malware) poses a major threat to computer systems. Oftentimes, malware is runtime-packed ...
Challenge of Windows physical memory acquisition and exploitation Matt Suiche In 2008, companies and governements interests for Microsoft Windows physical memory growed significantly. Acquisition was ...
HostileWRT: Fully-Automated Wireless Security Audit Platform on Embedded Hardware Philippe Langlois , Eugene Parkinson Computer and network security professionals are confronted on a daily basis with the issues of ...
Implementation of K-ary Viruses in Python Anthony Desnos Since works of Fred Cohen and Leonard Adleman, describing viral payload (offensive routine) as not ...
Some insights about the recent TCP DoS (Denial of Service) vulnerabilities Fernando Gont During the last four years years, the United Kingdoms Centre for the Protection of National ...