ZeroNights 2011 Nov. 11, 2011 to Nov. 11, 2011, Saint Petersburg,Russia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Dissecting unlawful Internet activities Fyodor Yarochkin In this presentation Fyodor will discuss his experience in analyzing computer security incidents. The material ...
Boston cybercrime Matrix or what is the business model of the modern hacker? Alexey Lukatsky Those days when hackers were informal looking youngsters, who spent nights in front of FreeBSD ...
Where do the money lie? Alexey Sintsov In the report problems of online banking from security point of view will be discussed. ...
Modern technologies in malware programs developing for RBS systems Eugene Rodionov , Alexander Matrosov Over the past two years development of malware programs for RBS systems turned from fate ...
Splitting, smuggling and cache poisoning: come back! Vladimir Vorontsov The report focuses on new research in the field of vulnerabilities such as HTTP response ...
About practical deobfuscation Dmitry Schelkunov , Vasily Bukasov It is not a secret that the aims for a reverse engineering become more and ...
Kernel Pool Overflow: from Windowsd XP to Windows 8 Nikita Tarakanov Kernel Pool overflow vulnerabilities are frequently discovered, like heap overflows in userland. However, there are ...
UI Redressing and Clickjacking: About click fraud and data theft Marcus Niemietz This talk focuses on UI redressing and clickjacking concerning their different attack vectors and counteractive ...
Behind the Window Update Scenes. From vulnerability to pat?h. Andrey Beshkov In this report it will be shown how different programs inside Microsoft, directed on interaction ...
Post Memory Corruption Memory Analysis. Jonathon Brossard In this presentation, we introduce a new exploitation methodology of invalid memory reads and writes, ...
How to hack a telecom and stay alive Sergey Gordeychik Penetration testing of telecommunication companies' networks is one of the most complicated and interesting tasks ...
Security Development Lifecycle Tools Ivan Medvedev The talk will give a quick overview of the Microsoft's Security Development Lifecycle, discuss the ...
Joint anti-crime. Open source security. Anton Bolshakov Report is devoted to the forthcoming launching of Pentoo 2012, utilities on security/computer investigation, which ...