ShakaCon 2009 June 24, 2009 to June 24, 2009, Honolulu,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
KEYNOTE:The Art of Espionage Luke Mcomie We have all heard the stories about looted laptops, misplaced media, and stupid user mistakes ...
Securing With the Enemy: Social Strategy and Teams of Rivals Sarah Blankinship , Jon Pincus While computer science is not traditionally viewed as a social science, problems in its domain ...
Dangerous Minds: The Art of Guerilla Data Mining Mark Ryan Talabis The inspiration of this study is the dollar bill. More specifically the "Eye of Providence" ...
Rage Against the Kiosk Paul Craig My name is Paul Craig, and I am the self proclaimed "King of Kiosk Hacking". ...
Emerging Trends in Security and Risk Management Daniel Blander The evolution of Security and Risk Management has progressed considerably since the days when a ...
Packing and the Friendly Skies Deviant Ollam Many of us attend cons and other events which involve the transportation of computers, photography ...
Challenge of Windows Physical Memory Acquisition and Exploitation Matthieu Suiche In 2008, companies and governments interests for Microsoft Windows physical memory grew significantly. Acquisition was ...
Opening Remarks Jason Martin , Anthony Giandomenico N/A
KEYNOTE $1.7 Trillion Under Siege Mark Stamford Taking technical security knowledge and putting it to work in a huge organization many challenges. ...
Sniff Keystrokes with Lasers/Voltmeters: Side Channel Attacks Andrea Barisani , Daniele Bianco TEMPEST attacks, exploiting Electro Magnetic emissions in order to gather data,are often mentioned by the ...
Advanced SQL Injection Joe Mccray SQL Injection is a vulnerability that is often missed by web application security scanners, and ...
Playing with Heyoka: Spoofed Tunnels and Undetectable Data Alberto Revelli , Nico Leidecker DNS Tunneling is a well known technique, and various free tools are available to play ...
Dynamic Tracing for Exploitation and Fuzzing Tiller Beauchamp This talk will cover the use of dynamic tracing for exploitation development and fuzzing. We ...
Microsoft Patches Little Sister But Forgets Big Brother Joseph Moti This presentation introduces methods used by hackers/attackers to hunt vulnerabilities in Microsoft Windows products, such ...