Search Results:316 hits in 1.19516 seconds searching for honeypot
Talk Titles and Abstracts: 315 results
- The Statue Of Liberty: Utilizing Active Honeypots For Hosting Potentially Malicious Events — Philip Trainor at Blackhat USA 2005
- Gen Iii Honeynets: The Birth Of Roo — Edward Balas at Blackhat USA 2005
- Observing The Tidal Waves Of Malware — Stefano Zanero at Blackhat USA 2007
- The Security Analytics Project: Alternatives In Analysis — Mark Talabis at Blackhat USA 2007
- Alternatives To Honeypots Or The Dtk — Andrewvander Stock at Blackhat USA 2001
- From Risk Awareness To Security Controls: Benefits Of Honeypots To Companies — Sergio Nunes at OWASP IBWAS 2010
- Neofelis, High-Interaction Honeypot Framework For Mac Os X — João Franco at OWASP IBWAS 2010
- Squeezing Attack Traces — Markus Kötter at Chaos Communication Congress 25
- Sans Dshield Webhoneypot Project — Jason Lam at OWASP Appsec 2009
- Behavioral Malware Analysis Using Sandnets (Build It!) — Joe Stewart at ShmooCon 2006
- Virtual Honeypots — Thorsten Holz at TROOPERS 2008
- Csn.Or.At Community Sense Net - Honeypot+ — Florian Eichelberger at NinjaCon 2010
- Honeymonkeys — Krisztian Piller, Sebastian Wolfgarten at Chaos Communication Congress 22
- Honeypot Forensics — Krisztian Piller at Chaos Communication Congress 21
- Anti-Honeypot Technology — Thorsten Holz at Chaos Communication Congress 21
- Kippos And Bits And Bits And Bits: Fun With Ssh Honeypotting — Chris Teodorski at CarolinaCon 7
- Building An Early Warning System In A Service Provider Network — Nico Fischbach at SyScan 2004
- Honeypot Forensic — Krisztian PillerandSebastian Wolfgarten at SyScan 2005
- Towards Automated Botnet Detection And Mitigation — Thorsten Holz at SyScan 2006
- Bypassing Modern Ids Products — Ron Gula at H2K 2000
- Honeypots: Tracking Hackers — Lance Spitzner at Blackhat Europe 2003
- Honeyd, Honeypots — Niels Provos at 12th USENIX Security Symposium 2003
- A Virtual Honeypot Framework — Niels Provos at 13th USENIX Security Symposium 2004
- Detecting Targeted Attacks Using Shadow Honeypots — Kostas Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, K. Xinidis, Evangelos P. Markatos, Angelos D. Keromytis at 14th USENIX Security Symposium 2005
- Advanced Linux Kernel Keylogger — Red Dragon at HITBSecConf Malaysia 2003
- Retaliation With Honeypots — Laurent Oudot at The Fifth HOPE 2004
- Ghetto Ids And Honeypots For The Home User — Black Ratchet at The Last HOPE 2008
- Phoneyc: A Virtual Client Honeypot — Jose Nazario at 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats 2009
- Client Honeypots - It’S Not Only The Network — Michael L. Davis at HITBSecConf Malaysia 2006
- Towards An Invisible Honeypot Monitoring System — Nguyen Anh Quynh at HITBSecConf Malaysia 2006
- Mapping Drive-By-Downloads With Client Honeypots — Pk at KiwiCon 2008
- Wifihoneypots Or How I Got Pwned Stealing Grandma'S Wifi — Numero at KiwiCon 2009
- Honeypot Technology — Lance Spitzner at PacSec 2003
- Mobile Honeypots: How To Catch A Laptop Thief — Chris Clymer at Notacon 3
- Searching for Phones on the Internet — Sandro Gauci at SEC-T 2009
- Funnypots And Skiddy Baiting — Adrian Crenshaw at Notacon 8
- Crawling the Dark Web — Tony Lee at Virus Bulletin 2008
- Google vs evil — Ivan Macalintal at Virus Bulletin 2008
- What a waste - the AV community DoS-ing itself — Joe Telafici at Virus Bulletin 2007
- Botnet tracking techniques and tools — Jose Nazario at Virus Bulletin 2006
- Legislation & technology: a coordinated approach toward achieving effective anti-spam law enforcement — Matthew Prince at Virus Bulletin 2005
- The waxing and waning of spammers' trickery — John Graham-cumming at Virus Bulletin 2004
- Malware in a small pot — Costin Raiu at Virus Bulletin 2002
- Keynote #1 Sun Tzu & the Honeypot — Barry Irwin at Security B-Sides CapeTown 2011
- Scenario Based Hacking in Wi-Fi Enterprise — Vivek Ramachandran at ClubHack 2011
- Network anti-reconnaissance for fun and profit: Messing with Nmap — Dan ( altf4 ) Petro at Security B-Sides Phoenix 2012
- Offensive Threat Modeling for Attackers: Turning Threat Modeling on its Head — Rafal Los, Shane Macdougall at Blackhat Europe 2012
- Honeypots as Detection Tools in Industrial Control Systems/ Supervisory Control and Data Acquisition Environments — Brent Huston at Industrial Control Systems Joint Working Group (ICSJWG) 2012
- The End of the PSTN As You Know It — Jason Ostrom, Jkarl Feinauer, William Borskey at DEF CON 20
- Network Anti-Reconnaissance: Messing with Nmap Through Smoke and Mirrors — Dan ( altf4 ) Petro at DEF CON 20
- Messing with Nmap Through Smoke and Mirrors — Dan ( altf4 ) Petro at HOPE 9
- Real-Time Evaluation of National Network Exposure to Emerging Threats — Fyodor Yarochkin at OWASPindia 2012
- HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots — Jean-francois Lalande, Patrice Clemente, Jonathan Rouzaud-cornabas at International Conference on Security and Cryptography (SECRYPT) 2012
- Payback on Web Attackers: Web Honeypots — Simon Roses Femerling at AppSecUSA 2012
- Fast Dynamic Extracted Honeypots in Cloud Computing — Stefan Katzenbeisser, Sebastian Biedermann, Martin Mink at CCSW 2012
- ENISA STUDY OUTCOME OF "EARLY WARNING: STUDY ON HONEYPOTS" — Cosmin Ciobanu at Hack.Lu 2012
- Network forensics the orphan child of cyber investigations — Robert Beggs at Sector 2012
- An adaptive honeypot system to capture IPv6 address scans — Kazuya Kishimoto, Kenji Ohira, Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura at ASECyberSec 2012
- Evaluation of Fingerprinting Techniques and a Windows-based Dynamic Honeypot — Hamid Mohammadzadeh, Masood Mansoori, Ian Welch at Australasian Information Security Conference (ACSW-AISC) 2013
- Network anti-reconnaissance for fun and profit: Messing with Nmap — Dan "altf4" Petro at BSidesPHX 2013
- Honeypots: State of the Practice — Piotr Kijewski at HoneyNet 2013
- HONEYPOT THAT CAN BITE: REVERSE PENETRATION — Alexey Sintsov at BlackHat EU 2013
- WHO'S REALLY ATTACKING YOUR ICS DEVICES? — Kyle Wilhoit, Workshops at BlackHat EU 2013
- BYOD: How will it shape your wireless network security in future? — Kiran Deshpande at NullCon2013 2013
- Capturing Zero-Day Information — Dinesh , Sumit at NullCon2013 2013
- Honeypots – “Be vewy, vewy quiet, let’s watch some hackers.. huh-uh-uh-uh-uh-uh-uh-uh” — Keith Dixon at BSidesChicago 2013
- Real world techniques and Firewall evasion in SQLi — Francis Alexander at DefconKerala 2013
- Short Paper: Nomadic Honeypots: A Novel Concept for Smartphone Honeypots — Collin Mulliner, Matthias Lange, Steffen Liebergeld at MOST 2013
- A Pragmatic Approach to Gathering Threat Data Using Honeypots — Przemek Jaroszewski, Cosmin Ciobanu at FIRST 2013
- [FR] Behind the Scenes of Web Attacks — Davide Canali at Nuit 2013
- [FR] Modern web frameworks, modern vulnerabilities — Nicolas Oberli, Florent Batard at Nuit 2013
- HoneydV6: A Low-interaction IPv6 Honeypot — Thomas Scheffler, Bettina Schnor, Sven Schindler, Simon Kiertscher, Eldad Zack at SECrypt 2013
- The SCADA That Didn't Cry Wolf- Who's Really Attacking Your ICS Devices- Part Deux! — Karsten Nohl at BlackHatUSA 2013
- Full spectrum computer network (active) defense mean more than simply “hacking back.” We’ve seen a lot of this issue lately. Orin Kerr and Stewart Baker had a lengthy debate about it online. New compa — Robert Clark at BlackHatUSA 2013
- Presentation title: Email Forward Secrecy — Nate Brown at BsidesDFW2013 2013
- Full spectrum computer network (active) defense mean more than simply “hacking back.” — Robert Clark at BlackHatUSA 2013
- Safety of the Tor network: a look at network diversity, relay operators, and malicious relays — Runa a. Sandvik at DEFCON 2013
- Be vewy vewy quiet, we're hunting hackers - Honeypots and the fun you can you have. — Keith Dixon at BSidesDetroit 2013
- Got Spies In Your Wires? — Chuck Willis, Evan Peña at BSidesDC 2013
- Human Honeypots: Social Engineering, Sexploitation, and Cyber Espionage — Kenneth Geers, James C. Foster at BSidesDC 2013
- Realtime analysis and visualization of internet status — Tiago Balgan Henriques, Tiago Martins, João Gouveia at BsideSLisbon 2013
- Legal Aspects of Full Spectrum Computer Network (Active) Defense — Robert Clark at DEFCON 2013
- Participatory Honeypots: A Paradigm Shift in the Fight Against Mobile Botnets — Pasquale Stirparo, Laurent Beslay at botconf 2013
- Risk assessment applied to web security — Florencio Cano Gabarda at 44Con 2011
- SpamPots Project: Using Honeypots to Measure the Abuse of End-User Machines to Send Spam — Cristine Hoepers at AUScert 2007
- Phase II - 2nd Generation Honeynet Technologies — Jay Beale at BlackHatAsia 2002
- Honeypots Against Worms 101 — Laurent Oudot at BlackHatAsia 2003
- CaffeineMonkey: Automated Collection, Detection and Analysis of Malicious JavaScript — Ben Feinstein, Daniel Peck at BlackHatDC 2007
- The Security Analytics Project: Alternatives in Analysis — Mark Talabis at BlackHatDC 2007
- Observing the Tidal Waves of Malware — Stefano Zanero at BlackHatDC 2007
- The Statue of Liberty: Utilizing Active Honeypots for Hosting Potentially Malicious Events — Philip Trainor at BlackhatUSA 2006
- WORKSHOP - Advanced Wi-Fi Security Penetration Testing — Vivek Ramachandran at BlackhatUSA 2011
- GEN III Honeynets: The birth of roo — Allen Harper, Edward Balas at BlackHatUSA 2005
- Honeypots, what are they and why should I care? — Andrew Waite at BSidesLondon 2010
- Money for nothing and long distance for phree — Sandro Gauci at BSidesLondon 2010
- Carmen, Rogue Web Server — Simon Roses Femerling at DeepSec 2007
- Observing the Tidal Waves of Malware — Stefano Zanero at DeepSec 2007
- VDLDS — All Your Voice Are Belong To Us — Ganesh Devarajan, Don Lebert at Defcon19 2011
- Honeypot Technology: Principles and Applications — Franck Veysset, Laurent Butti at First 2006
- Honeypot Technology: Principles and Applications (continued) — Franck Veysset, Laurent Butti at First 2006
- A National Early Warning Capability Based on a Network of Distributed Honeypots -- Detailed Synthesis — Cristine Hoepers at First 2005
- Keynote Address 2: Honeypots: Today and Tomorrow — Lance Spitzner at HITBDubai 2007
- Honeyclients — Kathy Wang at REcon 2005
- Security Lessons Learned from setting-up a Grid-CERT — Klaus Moller at AUScert 2008
- WebSensor - Sensing the Web with Community Collectors — Christian Bockermann at OWASPAppSecEU 2013
- OWASP AppSensor – In Theory, In Practice and In Print — Dennis Groves, Colin Watson at OWASPAppSecEU 2013
- Cyber Aikido: Defence in the real world — Rüdiger Peusquens at e-crime 2014
- libinjection: from SQLi to XSS — Nick Galbreath at OWASPAppSecCalifornia 2014
- CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot — Mark Felegyhazi, Tamás Holczer, Dániel Buza, Ferenc Miru at ESSoS 2014
- Scambaiter: Understanding Targeted Nigerian Scams on Craigslist — Damon Mccoy, Markus Jakobsson, Elaine Shi, Youngsam Park, Jackie Jones at NDSS 2014
- Running a non-attributable honeypot system via fly by night VPS providers — Ben Jackson at Beacon 2014
- Honeywords: Detectable Password Theft — Gavin Holt at BSidesLondon 2014
- INSIDE THE WORLD’S MOST DANGEROUS SEARCH ENGINE — John Matherly at Showmecon 2014
- An Automated Bot Detection System through Honeypots for Large-Scale — Fatih Haltas at CyCon 2014
- Avoiding Information Overload: Automated Data Processing with n6Return to TOC — Pawel Pawlinski at FIRST 2014
- pBot botnets: An OverviewReturn to TOC — Fernando Karl, Felipe Boeira at FIRST 2014
- Bee Master: Detecting Host-Based Code Injection Attacks — Sebastian Eschweiler, Elmar Gerhards-padilla, Thomas Barabosch at Dimva 2014
- From (Telnet) Honeypot To Botnet — Jeffery Wilkins at ToorCamp 2014
- Oh Bother, Cruising The Internet With Your Honeys, Creating Honeynets For Tracking Criminal Organizations — Terrence “tuna” Gareau, Mike Thompson at defcon 2014
- Reversing Engineering a Web Application - For Fun, Behavior & WAF Detection — Rodrigo Montoro at AppSecUSA 2014
- The Canary in the Cloud — Scot Berner at DerbyCon 2014
- Introducting Network-Socut: Defending The Soft Center of Your Network — “bill “oncee” Gardner, Aedan Somerville, Shawn Jordan at DerbyCon 2014
- HosTaGe: a Mobile Honeypot for Collaborative Defense — Max Mühlhäuser, Emmanouil Vasilomanolakis, Shankar Karuppayah, Mathias Fischer at SinCOn 2014
- FREEZE DRYING FOR CAPTURING ENVIRONMENT-SENSITIVE MALWARE ALIVE — Yosuke Chubachi at BlackHatEU 2014
- Anatomy of a VoIP Hack and How to Prevent Them — Eric Jacksch at CounterMeasure 2014
- Bringing PWNED To You: Interesting Honeypot Trends — Elliot Brink at GrrCon 2014
- Why ICS Organizations and AV Security Vendors See ICS Cyber Security Differently — Alexey Polyakov at ICScybersecCon 2014
- Document Tracking for Fun, Insight, and Profit — Roy Firestein at SecTor 2014
- KickaaS Security with DevOps and Cloud — Rich Mogull at SecTor 2014
- Data transforming your sewage into signatures - lessons learnt from building a hybrid honeypot named Amber — Adam Schoeman at BruCon 2014
- Conpot — Daniel Haslinger, Lukas Rist, Johnny Vestergaard at BruCon 2014
- Ballin on a Budget: Tracking Chinese Threat Actors on the Cheap — Andrew Morris at BSidesCharleston 2014
- SDR ALL THE THINGS — Dntlookbehindu , Zero_chaosx , Simonj_dc at BSidesDelaware 2014
- Honeypot How To — Roxy D. at BSidesDFW 2014
- Trap a Spam-Bot for Fun and Profit — Attila Marosi at DeepSec 2014
- I Am Nation State (And So Can You!) — Synackpwn , Tothehilt at hack3rcon 2014
- FINDING EVIDENCE OF WORDLISTS BEING DEPLOYED AGAINST SSH HONEYPOTS – IMPLICATIONS AND IMPACTS — Priya Rabadia, Criag Valli at SRISecCon 2014
- Advanced ICS Honeypot Techniques — Michael Winn at s4 2015
- Deception for the Cyber Defender: To Err is Human; to Deceive, Divine — Tom ( Decius ) Cross, Gregory Conti, David Raymond at Shmoocon 2015
- No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap — Andrew Morris at Shmoocon 2015
- Are Attacking Using Automation More Efficiently Than Defenders? — Marc-etienne M.léveillé at threads 2014
- Interesting Honeypot Trends — Ebrinkster at bsidesindy 2015
- Phoneypot: Data-driven Understanding of Telephony Threats — Payas Gupta, Mustaque Ahamad, Vijay Balasubramaniyan, Bharat Srinivasan at NDSS 2015
- Honeypots suck — John Matherly at SASKaspersky 2015
- Constructing Cost-Effective and Targetable Industrial Control System Honeypots for Production Networks — Stephen Dunlap, Mason Rice, Michael Winn, Juan Lopez at IFIP 2015
- HoneySAP: Who really wants your money — Martin Gallo at Troopers 2015
- Lessons Learned from Building and Running MHN, the World's Largest Crowd-sourced Honeynet — Jason Trost at BSidesSanFrancisco 2015
- Honeypots for Active Defense — Greg Foss, Logrhythm Labs at InfoSecSouthWest 2015
- Game of Hacks: The Mother of All Honeypots — Maty Siman at RSAus 2015
- HoneyPot How To — Roxy D. at BSideSanAntonio 2015
- Hey! You! Get Off of My Cloud! Attacks Against Cloud Server HoneypotsReturn to TOC — Martin Lee, Neil Rankin at First 2015
- IDS + Honeypots Making Security Simple — Mobmane at HackMiami 2015
- #204: HONEYPOTS FOR ACTIVE DEFENSE — Greg Foss at RMISC 2015
- Monitoring Intrusions with Honeypots and Nagios — Spenser Reinhardt at Secure360 2015
- So you think all those attacks are originated from China? Let's go through a journey of an in-depth investigation of attacks by using custom honeypots — Pedram Hayati at Wahckcon 2015
- Deploying Honeypots To Gather Actionable Threat Intelligence — James Taliento at CircleCityCon 2015
- Uncovering Secret Connections Using Network Theory and Custom Honeypots — Pedram Hayati at HITBamsterdam 2015
- Track 2 - POS Skimming Honeypot Software Stopping the breaches — Weston Hecker at SCcongress 2015
- BREAKING HONEYPOTS FOR FUN AND PROFIT — Gadi Evron, Dean Sysman, Itamar Sher at BlackhatUS 2015
- BRING BACK THE HONEYPOTS — Haroon Meer, Marco Slaviero at BlackhatUS 2015
- Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open Source Tools — Jason Trost, Nicholas Albright at BSidesLasVegas 2015
- You Hack, We Capture: Attack Analysis with Honeypots — Ioannis Koniaris at BSidesLasVegas 2015
- Chellam – a Wi-Fi IDS/Firewall for Windows — Vivek Ramachandran at Defcon 2015
- Medical Devices: Pwnage and Honeypots — Scott Erven, Mark Collao at Defcon 2015
- Separating Bots from the Humans — Ryan Mitchell at Defcon 2015
- Chigula — a framework for Wi-Fi Intrusion Detection and Forensics — Vivek Ramachandran at Defcon 2015
- Topic: Theory, Practice and HoneyPots — Azhad Desai at ISSA 2015
- Game of Hacks: The Mother of All Honeypots — Igor Matlin at AppSecUSA 2015
- The Digital Cockroach Bait Station — Robert Simmons at Balcon 2015
- Honeypots for Active Defense — Greg Foss at DerbyCon 2015
- Medical Devices: Pwnage and Honeypots — Scott Erven, Mark Collao at DerbyCon 2015
- Building a Better Honeypot Network — Josh Pyorre at DerbyCon 2015
- The Cyber Pandemic – Medical Devices: Pwnage and Honeypots, — Scott Erven at HackerHalted 2015
- Dr. Honeypots or: How I Learned to Stop Worrying and Love My Enemies (4 hours) — Guillaume Arcas, Lukas Rist at HackLu 2015
- buildign a better honeypot network — Josh Pyorre at BsidesLA 2015
- Game of Hacks: Play, Hack & Track — Amit Ashbel at OWASPAppSecIsrael 2015
- YOUR MALWARE SUCKS AND YOU KNOW IT. — Ethan Dodge at Saintcon 2015
- Incident Handling Automation with intelmq — Aaron Kaplan, Sebastian Wagner, Otmar Lendl at BSidesVienna 2015
- Building a Better Honeypot Network — Josh Pyorre at DeepSec 2015
- I Am Nation State (And So Can You!) — Synackpwn , Tothehilt at hack3rcon5 2015
- CyberClinic Delta - Beyond Sandboxing and Honeypots – How to Diagnose and Rid Your System of Achilles Heel Syndrome — Bob Flores, Junaid Islam at CyberSecure 2015
- Distributed Sensor Data Contextualization at Scale for Threat Intelligence Analysis — Jason Trost at Flocon 2016
- Where Do the Phishers Live? Collecting Phishers’ Geographic Locations from Automated Honeypots — Robbie Gallagher at Shmoocon 2016
- Breaking Honeypots for Fun and Profit — Gadi Evron, Dean Sysman, Itamar Sher at BSidesSF 2016
- Medical Devices: Pwnage & Honeypots! — Scott Erven at Cyperhcon 2016
- Breaking Honeypots for Fun and Profit — Gadi Evron, Itamar Sher, Deansysman at CCC 2015
- Automating Scambaiting with Markov Chains — Robbie Gallagher at InfoSecSouthWest 2016
- Building Honeypots to Monitor DDoS Tech — Terrence “tuna” Gareau at phdays 2016
- Waf.js: How to Protect Web Applications Using JavaScript — Arseny Reutov, Denis Kolegov at phdays 2016
- Taking honeypots from research to corporate value — Andrew Waite at bsideslondon 2016
- Honeypots and Deceptive Operations: Can you catch more spies with honey(pots)? — David Chismon at bsideslondon 2016
- honeyHoax - A centralised honeypot — Jordan Constantine at bsideslondon 2016
- Honeypot that Can Bite: Reverse Penetration — Alexey Sintsov at phdays 2013
- BADWPAD — Maxim Goncharov at blackhatUS 2016
- CALL ME: GATHERING THREAT INTELLIGENCE ON TELEPHONY SCAMS TO DETECT FRAUD — Aude Marzuoli at blackhatUS 2016
- INVESTIGATING DDOS - ARCHITECTURE ACTORS AND ATTRIBUTION — Elliott Peterson, Andre Correa at blackhatUS 2016
- Game of Hacks – Play, Hack, and Track — Igor Matlin at Converge 2016
- Breaking Honeypots for Fun and Profit — Dean Sysman at CornerstonesofTrust 2016
- Busted! Point of Sale Threat Actor Attribution through POS Honeypots — Kyle Wilhoit at FIRST 2016
- Medical Devices: Pwnage and Honeypots — Adam Brand, Scott Erven at Hope 2016
- PLC for Home Automation and How It Is as Hackable as a Honeypot — Scott Erven, Philippe Lin at BSidesLasVegas 2016
- Finding the Sweet Spot: Counter Honeypot Operations (CHOps), — Jon Creekmore at Takedowncon 2016
- Point of Sale Voyuer- Threat Actor Attribution Through POS Honeypots — Kyle Wilhoit at DerbyCon 2016
- Nothing is beyond our pots - An Introductory Worskhop about Honeypots — Guillaume Arcas at hacklu 2016
- EGO MARKET: WHEN PEOPLE'S GREED FOR FAME BENEFITS LARGE-SCALE BOTNETS — Olivier Bilodeau, Masarah Paquet-clouston at BlackHatEU 2016
- Improve DDoS Botnet Tracking With Honeypots — Ya Liu at botconf 2016
- Hands on Hacking with the WiFi Pineapple, USB Rubber Ducky and LAN Turtle (closed) — Robin Wood, Sebastian Kinne, Darren Kitchen at Deepsec 2016
- HoneyPy & HoneyDB — Phillip Maddux at lascon 2016
- Drawing the Foul: Operation of a DDoS Honeypot — Damian Menscher at enigma 2017
- Honeypots and Live Threat Intelligence — Kat Fitzgerald at Bsidestampa 2017
- MOBILE-TELEPHONY THREATS IN ASIA — Payas Gupta, Marco ‘embyte’ Balduzzi, Lion Gu at BlackhatAsia 2017
- Honeypotting - A journey into deception based security - 2hrs — Adel Karimi, Elliott Brink at Bsidescanberra 2017
- Deception Defence 101 + A tool-less approach to setup a Deceptive Defence environment — Pedram Hayati at Bsidesljubljana 2017
- Heisenberg Cloud: At-Scale Cross-Cloud Adversary Analytics — Bob Rudis at BSidesBoston 2017
- Toasting the Toasters: Tracking Botnets Using Machine Learning and Automated Verification — Jeffrey Bickford, Tom Boatwright at BSidesDenver 2017
- Real Intel - Honeypots and Live Threat Intelligence — Kat Fitzgerald at BSidesDenver 2017
- A Pretty Sweet Presentation: How To (Maybe Not) Honeypot — Alexander Klepal at BSidesSatx 2017
- HoneyPy & HoneyDB — Phillip Maddux at Carolinacon 2017
- IOTCANDYJAR: TOWARDS AN INTELLIGENT-INTERACTION HONEYPOT FOR IOT DEVICES — Tongbo Luo, Xing Jin, Zhaoyan Xu, Xin Ouyang at blackhat 2017
- SS7 ATTACKER HEAVEN TURNS INTO RIOT: HOW TO MAKE NATION-STATE AND INTELLIGENCE ATTACKERS' LIVES MUCH HARDER ON MOBILE NETWORKS — Martin Kacer, Philippe Langlois at blackhat 2017
- Why is China all up in my SQL server? — Andrew Brandt at bsideslasvegas 2017
- Vaccination - An Anti-Honeypot Approach — Gal Bitensky at bsideslasvegas 2017
- BLACKHOLE NETWORKS - AN UNDERESTIMATED SOURCE FOR INFORMATION LEAKS — Alexandre Dulaunoy at First 2017
- CANARIES IN A COAL MINE… — Peter Morin at First 2017
- PRACTICAL WORKFLOW FOR AUTOMATION AND ORCHESTRATION OF ADDRESSING CYBER. THREAT: CASE STUDY OF MIRAI BOTNET IN MALAYSIA — Megat Mutalib at First 2017
- TRYING TO KNOW YOUR OWN BACKYARD (A NATIONAL CERT PERSPECTIVE) — Paweł Pawliński at First 2017
- 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work — Rahul Binjve at Cocon 2017
- Lessons Learned Hunting IoT Malware — Olivier Bilodeau at 44con 2017
- “Hacking Hackers con honeypots y hip hop” — Joaquín Molina at dragonjarcon 2017
- “A no endulzarse con las honeypots!” — Mateo Martinez at dragonjarcon 2017
- You Got Your SQL Attacks In My Honeypot — Andrew Brandt at grrcon 2017
- Canaries in a Coal Mine - Using Honeypots to Detect Lateral Movement — Peter Morin at bsidesfredericton 2017
- INTELMQ - THE FULL PROCESSMENT OF A THREAT — André Garrido at bsideslisbon 2017
- Beer, Bacon and Blue Teaming — Chris Campbell at bsideswellington 2017
- Info Sec for Cheapskates — Mark Havens at bsideswinnipeg 2017
- Open Source Defensive Security (closed) — Leszek Miś at deepsec 2017
- Down The Rabbit Hole: How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets — Christophe Tafani-dereeper at Grehack 2017
- Lessons Learned Hunting IoT Malware — Olivier Bilodeau at hackfest 2017
- Vaccination - An Anti-Honeypot Approach — Gal Bitensky at hackfest 2017
- Sysmon Sigs for Linux Honeypots, — Olivier Bilodeau at BOTCONF 2017
- Automated Detection and Analysis of IoT Network Traffic Through Distributed Open Source Sensors and Citizen Scientists — Joe Mcmanus at flocon 2018
- Applied Deception Beyond the Honeypot: Moving Past 101 — Robert Wood at owaspapseccalifornia 2018
- WEAPONIZING IOT – NOT! — Kat Fitzgerald at bsidestampa 2018
- Towards Measuring the Effectiveness of Telephony Blacklists. — Roberto Perdisci, Payas Gupta, Mustaque Ahamad, Sharbani Pandit at NDSS 2018
- The Bucket List: Experiences Operating S3 Honeypots — Cameron Ero at BSidesSanFrancisco 2018
- Honeypots 2.0: A New ‘Twist’ on Defending Enterprise Networks with Dynamic Deception at Scale — Lane Thames at BSidesSanFrancisco 2018
- PostgreSQL Threats and Attacks in the Wild — Aj Fleming at BSidesSanFrancisco 2018
- How I Met Your C2: From honeypots to chats — Rush -, Nichole - at BSidesIndy 2018
- The Forgotten Fruit: Repairing the Misconception Honeypots Only Produce Statistics and Stale Data Instead of Actionable Intelligence — Ramece Cave at BSidesOklahoma 2018
- Finding the Seoul of Malware: An Analysis of Attacks in East Asia — Justin Nitz at BSidesKansasCity 2018
- Another name for Intel: Honeypots — Kat Fitzgerald at BSidesSatX 2018
- Honeypots, Deception, and Frankenstein — Phillip Maddux at CarolinaCon14 2018
- It's a trap! - Remote detection of low and medium interaction honeypots — Julio Cesar Fort at ConfidenceKrakow 2018
- Things Attack: Peek into a 18 Months IoT Honeypot — Tan Kean Siong at KasperskySASCancun 2018
- Things Attack: Peek into a 18 Months IoT Honeypot — Tan Kean Siong at KasperskySASCancun 2018
- Honeypots, Deception, and Frankenstein — Phillip Maddux at SourceBoston 2018
- Paravirtualized Honeypot Deployment for the Analysis of Malicious Activity — Andronikos Kyriakou at BSidesAthens 2018
- Not your Mother's Honeypot - Another name for Threat Intel — Kat Fitzgerald at BSidesLasVegas 2018
- Building and Maintaining Large-scale Honeypot Sensor Networks — Piotr Kijewski at FirstConferenceKualaLumpur 2018
- Detect & Respond to IoT Botnets as an ISP — Christoph Giese at FirstConferenceKualaLumpur 2018
- Things Attack: Peek into an 18-month IoT Honeypot — Tan Kean Siong at FirstConferenceKualaLumpur 2018
- Emotet Malware — Neil Fox at FirstConferenceKualaLumpur 2018
- Smart Contract Honeypots for Profit (and probably Fun) — Ben Schmidt at toorcon2018SanDiego 2018
- Deploying Deceptive Systems: Luring Attackers from the Shadows — Kevin Gennuso at DerbyConVIIIEvolution 2018
- Advanced Deception Technology Through Behavioral Biometrics — Curt Barnard, Dawud Gordon at DerbyConVIIIEvolution 2018
- To Execute or Not to Execute. How to Build a Malware Execution Lab — Maria García at ekopartySecurityConference 2018
- Smart Contract Honeypots for Profit (and probably fun) — Ben Schmidt at ekopartySecurityConference 2018
- Twisted Haystack: Protecting Industrial Systems with Dynamic Deception — Lane Thames at SECTOR 2018
- Mirror on the wall: using blue team techniques in red team ops — Mark Smeets at BRUCON 2018
- Hey, You Got Your SQL In My Honeypot! — Andrew Brandt at SAINTCONUtah 2018
- Smart Contract Honeypots for Profit (and probably Fun) — Ben Schmidt at CODEBLUE2018@TOKYO 2018
- The Evolution of Cyber-Crime — Erik Wennerström at e-crime&cybersecuritynordics 2018
- 2018: A retrospective — Jared Naude at BSidesCapetown 2018
- Network Telescopes Revisited: From Loads of Unwanted Traffic to Threat Intelligence — Piotr Bazydlo, Adrian Pawliński at FloCon2019 2019
- IPv666: Address of the Beast — Christopher Newlin at Shmoocon2019 2019
- A Desktop Security Journey that Ends (for now) with Qubes OS — Aelon Porat Porat at BSidesPhiladephia 2019
- Intro to k8s Security - or Taming the Great Spaghetti Monster! — Kat Fitzgerald at BSidesTampa 2019
- Honeypotting and Sandboxing Beginners Guide — Eric Synopsis at CheckPointAmericas 2019
- Wow, it really is always DNS! Becoming a Part of the DDoS Problem ( on purpose ). — Cody Smith at BSidesColumbus 2019
- Building STINGAR to enable large scale data sharing in near real-time — Jesse Bowling at FIRSTCyberThreatIntelligenceSymposium 2019
- Wi-Bear: Intelligent Autonomous Wi-Fi Honeypot Detection — Vivek Ramachandran at BSidesCanberra 2019
- Pwning the Core of IoT Botnets: From a Honeypot to Gigabytes of Botnet Source Code — Tan Kean Siong at BlackHatAsia2019 2019
- Detection of Threats to IoT Devices Using Scalable VPN-forwarded Honeypots — Nils ole Tippenhauer, Yuval Elovici, Martin Ochoa, Asaf Shabtai, Amit Tambe, Yan Lin Aung, Ragav Sridharan at CODASPY2019 2019
- Detection of Threats to IoT Devices Using Scalable VPN-forwarded Honeypots — Nils ole Tippenhauer, Yuval Elovici, Martin Ochoa, Asaf Shabtai, Amit Tambe, Yan Lin Aung, Ragav Sridharan at CODASPY2019 2019
- "Wi-Bear: Intelligent Autonomous Wi-Fi Honeypot Detection" — Vivek Ramachandran at BSidesCanberra 2019
- HAXPO: Hey Attacker! I Can See You! — Ross ‘shodan’ Bevington at HITBSecConf 2019
- Human vs Bots: Detecting Human Attacks in a Honeypot Environment — Masooda Bashir, Shreya Udhani* at ISDFS 2019
- Putting the Intelligence Back in Threat Intel (Because Math) — Edward Mccabe at TechnoSecurity&DigitalForensics 2019
- Deception and Honeypots — Jake Williams at IANSLosAngeles 2019
- Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware — Masarah Bilodeau at BlackHatUSA2019 2019
- Human Honeypots or: How I Learned to Stop Worrying and Love the Implant — Nick Koch at BSidesLasVegas 2019
- Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware† — Olivier Bilodeau, Masarah Paquet-clouston at DefCon27 2019
- The Ether Wars: Exploits, counter-exploits and honeypots on Ethereum — Bernhard Mueller, Daniel Luca at DefCon27 2019
- Real Time Vulnerability Alerting by Using Principles from the United States Tsunami Warning Center — Amol Sarwate at GlobalAppSec-DC 2019
- Building Your First Malware Analysis Lab — Joel Prentice at BSidesHarrisburg 2019
- How to Make a Honeypot Stickier (SSH*) — Jose Hernandez at GrrCon 2019
- Honeypots and Real Threat Intel — Kat Fitzgerald at BSidesChicago 2019
- Understanding the IoT Threat Landscape and a Home Appliance Manufacturer's Approach to Counter Threats to IoT — Hikohiro Osawa at BlackHatEurope 2019
- Improving Intrusion Detectors by Crook-sourcing — Latifur Khan, Kevin W. Hamlen, Frederico Araujo, Gbadebo Ayoade, Khaled Al-naami, Yang Gao at ACSAC2019 2019
- Characterizing Internet-scale ICS Automated Attacks through Long-term Honeypot Data — Limin Sun, Xuan Feng, Jianzhou You, Shichao Lv, Yichen Hao, Ming Zhou at ICICS 2019
- IoT Device Security (Honeypots) — Kat Fitzgerald at BSidesTampa 2020
- Deep Down the Rabbit Hole: On References in Networks of Decoy Elements — Daniel Schotten, Daniel Reti, Daniel Fraunholz, Janis Zemitis at CyberScience2020 2020
- An Overview of Web Robots Detection Techniques — Hanlin Chen, Hongmei Starr at CyberScience2020 2020
- Towards Detecting Human Actions, Intent, and Severity of APT Attacks by Applying Deception Techniques — Joel Chacon, Sean Macfarlane at CyberScience2020 2020
- Deceiving ICS Insider Threats — Mike Rebultan at ICSCyberSecurityConference 2020
- Experimenting with Real-Time Event Feeds — Jose Morris at BlackHatUSA2020 2020
- Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis — Bradley Reaves, Sathvik Prasad, Elijah Bouma-sims, Athishay Kiran Mylappan at 29thUSENIXSecuritySymposium 2020
- Cyber Deterrence: Beyond Cyber Defense — Osama Mohamed Hijji at ArabSecurityConference 2020
- Using Honeypots to Catch Hackers! — Mikael Vingaard at CS4CA 2020
- Fooling Nmap and Metasploit: Cyber Deception on Production Systems — Henry Reed at ShellCon.io 2020
- Faking a Factory: Creating and Operating a Realistic Honeypot — Charles Perine at BlackHatAsia 2020
- The Fault in Our Shells: A Weekly Overview Running Cowrie — Ewaldo Simon Hiras at AppSecIndonesia2020 2020
- Research on New Vectors of UDP-Based DDoS Amplification Attacks of IoT — Dr. Wenmao Liu at RSAC21 2021
- The Non-Social Distanced Reality of the Internet of Things — Rachel Daigle at RSAC22 2022
- Hey! Your database got pwned — Islam Heralla at Kernelcon 2022
Topics: result
Companies: 1 result