HITB 2012 May 24, 2012 to May 25, 2012, Amsterdam,Netherkands

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Turninig android inside out Ivo Pooters N/A
winRT: The metro-politan museum of security Sebastien Renaud , Kevin Szkudlapski N/A
whitehat shellcode:not for exploits Didier Stevens N/A
one flew over the cuckoos nest: automated malware analysis Claudio Guarnieri N/A
killing a bug bounty program - twice Nir Goldshlager , Itzhak 'zuk'avraham N/A
pastebinmon.pl and leakedbin.com Xavier Mertens N/A
third party sofrware in your baseband Ralf-Philipp Weinmann N/A
whistling over the wire Arnauld Mascret N/A
evolution of the iphone baseband and unlocks Musclenerd N/A
hacking using the dynamic binary instrumentation Gal Diskin N/A
inception of the SAP platforms's brain. Attacking the SAP solution manager Juan Pablo N/A
security threatsin the world of digital television Adam Gowdiak N/A
hack to the future Marinus Kuivenhoven N/A
window shoppin:browser bug hunting in 2012 Robert Suggi Liverani , Scot Bell N/A
security vulnerabilities of digital video broadcast chips Adam Gowdiak N/A
ssexy: binary obfuscation the SSE way Juriaan Bremer N/A
exclusive - too little too late: the dutch cyber security strategy Brenno De Winter N/A
Keynote 2 : trust,security and society Bruce Schneier N/A
PostScript - danger ahead - Hacking MEP's PCs and beyond Andrei Costin N/A
CXMI/VXML auditing for IVR pentesters and PCI/DSS consultants Rahul Sasi N/A
the power of foca 3: why you'll love the seals Chema Alonso N/A
automatically searching for vulnerabilities : how to use taint analysis to find security bugs Nikita Tarakanov , Alex Bazhanyuk N/A
Part 1 : Corona Jailbreak for iOS 5.0.1 Cyril , Nikias \xe2\x80\x98@pimskeks\xe2\x80\x99 Bassen , Joshua ‘@p0sixninja’ Hill N/A
integrating DMA attacks in metasploit Rory Breuk , Albert Spruyt N/A
close-up of three technical hackerspace projects Elger 'stitch' Jonker N/A
bypassing the android permission model Georgia Weidman N/A
part 2 : the absinthe jailbreak for iOS 5.0.1 David Wang , Cyril , Nikias \xe2\x80\x98@pimskeks\xe2\x80\x99 Bassen , Joshua ‘@p0sixninja’ Hill N/A
TitanEngine 3.0: return of the titan and the exile of PE malformation Mario Vuksan , Tomislav Pericin N/A
Amazon web services: a deep analysis of the organization, data centers and global network Kenneth White N/A
attacking XML processing Nicolas Gregoire N/A
satancloud: a journey into the privacy and security risks of cloud computing Mario Balduzzi N/A
ghost in the windows 7 allocator Steven Seeley N/A
smashing VMDK files fo fun and profit Enno Rey , Daniel Mende N/A