InfoSecSouthWest 2014 April 4, 2014 to April 6, 2014, Texas,USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Keynote: Building a Modern Security Organization | Zane Lackey | Continuous deployment and the DevOps philosophy have forever changed the ways in which businesses operate. ... | IncludeThinkstScapes |
Trapping Hacks With Ensnare | Scott Behrens , Andy Hoernecke | Several methods exist for protecting applications from attackers outside of secure coding practices. Most of ... | |
DemystiPHYing 802.15.4 Digital Radio; or, How to Weaponize Fingerprinting for Packet-in-Packet Mitigation Bypasses | Sergey Bratus , Travis Goodspeed | The PHY layer of digital radio is commonly viewed as a black box that takes ... | |
Adventures in Pentester Recruitment - Judging Weak Sauce from Fu in the Age of Experts | Kevin Dunn , Jessey Bullock | Adventures in Pentester Recruitment - Judging Weak Sauce from Fu in the Age of Experts ... | |
How to Save the Environment, or; Why Nobody Takes your Security Advice | Daniel "unicornfurnace" Crowley | Some security advice is bad, not because it doesn't fix the problem it's aimed at ... | |
Researching Android Device Security with the Help of a Droid Army | Joshua j. Drake | In the last few years, Android has become the world's leading smart phone operating system. ... | |
Thwarting Evil Maid Attacks | Eric Michaud | Increasingly, users and their computing hardware are exposed a range of software and hardware attacks, ... | |
Network Threat Detection via Machine Learning | Josiah Hagen , Brandon Niemczyk | A walk through some of the challenges and solutions to utilizing machine learning for network ... | |
i r web app hacking (and so can you!) | Brandon Perry | i r web app hacking (and so can you!) will cover Brandon's experiences and learnings ... | |
Reversing Java Malware with Radare | Adam Pridgen | The primary focus of this talk is to introduce new features added to the Radare ... | |
Password Topology Histogram Wear-Leveling, a.k.a. PathWell | Rick "minga" Redman | PathWell is a novel approach to enforcing password complexity, designed to thwart modern cracking tools ... | |
Click Security | Mike Sconzo , Brian Wylie | Is there a Pony in that Pile of Shit? Our presentation discusses the importance of ... |