Conferences for the period :
ShmooCon-2011 - Washington DC, USA
Total Talks : 49 Tags : Mobile Security,Android,Security,Community,Panel,Analysis,Infrastructure,Statistics,Wireless,Forensics,Monitoring,Web,Testing,Legal,Access,Exploitation,Malware,Development,Business,Browser,Automation,Privacy CarolinaCon-7 - Raleigh, USA
Total Talks : 16 Tags : Security,Community,Testing,Business,Malware,Risk,Cryptography,Infrastructure,Analysis Security B-Sides Cleveland-2011 - Cleveland, USA
Total Talks : 6 Tags : Security Security B-Sides MSP-2011 - Saint Paul, USA
Total Talks : 7 Tags : Security Security B-Sides San Francisco-2011 - San Francisco, USA
Total Talks : 27 Tags : Security CanSecWest-2011 - Vancouver, Canada
Total Talks : 17 Tags : Security Blackhat Europe-2011 - Barcelona, Spain
Total Talks : 28 Tags : Security Hackito Ergo Sum-2011 - Paris, France
Total Talks : 16 Tags : Security Infiltrate-2011 - Miami, USA
Total Talks : 14 Tags : Security Notacon-8 - Cleveland, USA
Total Talks : 39 Tags : Security Nullcon-2011 - Goa, India
Total Talks : 26 Tags : Security TROOPERS-2011 - Heidelberg, Germany
Total Talks : 22 Tags : Security FloCon-2011 - Salt Lake City, USA
Total Talks : 22 Tags : Security SOURCE Boston-2011 - Boston, USA
Total Talks : 1 Tags : Exploitation BlackHatDC-2011 - Washington,USA
Total Talks : 32 Tags : RSA-2011 - N.A,US
Total Talks : 63 Tags :
ShmooCon-2011 - Washington DC, USA
Total Talks : 49 Tags : Mobile Security,Android,Security,Community,Panel,Analysis,Infrastructure,Statistics,Wireless,Forensics,Monitoring,Web,Testing,Legal,Access,Exploitation,Malware,Development,Business,Browser,Automation,Privacy CarolinaCon-7 - Raleigh, USA
Total Talks : 16 Tags : Security,Community,Testing,Business,Malware,Risk,Cryptography,Infrastructure,Analysis Security B-Sides Cleveland-2011 - Cleveland, USA
Total Talks : 6 Tags : Security Security B-Sides MSP-2011 - Saint Paul, USA
Total Talks : 7 Tags : Security Security B-Sides San Francisco-2011 - San Francisco, USA
Total Talks : 27 Tags : Security CanSecWest-2011 - Vancouver, Canada
Total Talks : 17 Tags : Security Blackhat Europe-2011 - Barcelona, Spain
Total Talks : 28 Tags : Security Hackito Ergo Sum-2011 - Paris, France
Total Talks : 16 Tags : Security Infiltrate-2011 - Miami, USA
Total Talks : 14 Tags : Security Notacon-8 - Cleveland, USA
Total Talks : 39 Tags : Security Nullcon-2011 - Goa, India
Total Talks : 26 Tags : Security TROOPERS-2011 - Heidelberg, Germany
Total Talks : 22 Tags : Security FloCon-2011 - Salt Lake City, USA
Total Talks : 22 Tags : Security SOURCE Boston-2011 - Boston, USA
Total Talks : 1 Tags : Exploitation BlackHatDC-2011 - Washington,USA
Total Talks : 32 Tags : RSA-2011 - N.A,US
Total Talks : 63 Tags :
date of conf | number of days | name of conf | Edition | conf URL | talk num | speaker | topic | slides |
---|---|---|---|---|---|---|---|---|
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 1 | Zach Lanier , Jon Oberheide | Team Joch Vs. Android: The Ultimate Showdown | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 2 | Peiter Zatko | Analytic Framework For Cyber Security | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 3 | Rick Redman , Martin Bos , Robert Imhoff , David Schuetz | The Past, Present, And Future Of Something You Know | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 4 | Axelle Apvrille , Kyle Yang | Defeating Mtans For Profit | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 5 | Sean Coyne | The Getaway: Methods And Defenses For Data Exfiltration | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 6 | Adrian Crenshaw | Malicious Usb Devices:Is That An Attack Vector In Your Pocket Or Are You Just Happy To See Me? | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 7 | Daniel Crowley | Url Enlargement: Is It For You? | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 8 | Ray Davidson | Shmoocon Labs Goes To College | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 9 | Scott Dunlop | Reverse Engineering Using The Android Emulator | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 10 | Sarah Edwards | Inside The App: All Your Data Are Belong To Me | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 11 | Marc Eisenbarth | Half Baked: Hardware Hacking Mixed With Sweet Software Reverse Engineering | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 12 | Richard Friedberg | Fun With Flow | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 13 | Andrew Gavin | Gone In 60 Minutes: Stealing Sensitive Data From Thousands Of Systems Simultaneously With Opendlp | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 14 | Ron Gutierrez | Unlocking The Toolkit: Attacking Google Web Toolkit Applications | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 15 | Deral Heiland , Pete Arzamendi | Printer To Pwnd: Leveraging Multifunction Printers During Penetration Testing | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 16 | Marcia Hofmann | Computer Search And Seizure | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 17 | Dan Klinedinst | 3D Modeling And Visualization Of Real Time Security Events | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 18 | Daniel Kovach | Yet Another Heapspray Detector | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 19 | Jon Larimer | Usb Autorun Attacks Against Linux | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 20 | Trent Lo | An Evite From Surbo? Probably An Invitation For Trouble. | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 21 | Johnny Long | Hackers For Charity | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 22 | John Mcnabb | Hacking Smartwater Wireless Water Networks | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 23 | Scott Moulton | Hard Drive Paperweight: Recovery From A Seized Motor! | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 24 | Danny Quist | Visual Malware Reversing: How To Stop Reading Assembly And Love The Code | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 25 | James Oakley , Sergey Bratus | Exploiting The Hard-Working Dwarf | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 26 | Michael Ossmann | Project Ubertooth: Building A Better Bluetooth Adapter | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 27 | Matthew Pawloski , Fotios Lindiakos | Intersect: Combining Commercial/Foss Tools With Custom Code To Root Out Malware | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 28 | Marsh Ray | A Paranoid Schizophrenia-Based Model Of Data Security | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 29 | Daniel Mende , Enno Rey | Attacking 3G And 4G Mobile Telecommunications Networks | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 30 | Richard Rushing | Defending Against Targeted Attacks Using Duck Tape, Popsicle Sticks And Legos | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 31 | Javier Sanchez | Hacking The Business Capability Stack: Make Corporate Bureaucracy Work For You | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 32 | Ben Smith | Printers Gone Wild! | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 33 | Ryan Speers , Ricky Melgares | Zigbee Security: Find, Fix, Finish | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 34 | Ashley Thomas | Tracking Flaws – Stream Reassembly Issues In Snort Ips | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 35 | Georgia Weidman | Transparent Botnet Control For Smartphones Over Sms | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 36 | Tara Whalen | Are You Receiving Me? Recent Issues In Wifi Privacy | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 37 | Larry Pesce , Mick Douglas | Information Disclosure Via P2P Networks | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 38 | Daniel Crowley | Windows File Pseudonyms | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 39 | Marsh Ray , Steve Dispensa | Keynote – Closing The Tls Authentication Gap | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 40 | Blake Hartstein | Jsunpack-Network Edition Release: Javascript Decoding And Intrusion Detection | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 41 | Enno Rey , Oliver Roeschke | Wlccp – Analysis Of A Potentially Flawed Protocol | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 42 | Michael Weigand | Build Your Own Predator Uav @ 99.95% Discount | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 43 | Scott Moulton | Diy Hard Drive Diagnostics: Understanding A Broken Drive | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 44 | Tyler Shields | Blackberry Mobile Spyware | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 45 | Kevin Johnson , Mike Poor | The Friendly Traitor: Our Software Wants To Kill Us | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 46 | Jim Manley | Back To The Glass House | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 47 | Brian Holyfield | Cracking The Foundation: Attacking Wcf Web Services | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 48 | Michael Sutton | Pulling The Plug: Security Risks In The Next Generation Of Offline Web Applications | |
Jan. 28, 2011 | 2 | ShmooCon | 2011 | http://www.shmoocon.org/ | 49 | Roger Johnston , Jon Warner | Better Approaches To Physical Tamper Detection |
date of conf | number of days | name of conf | Edition | conf URL | talk num | speaker | topic | slides |
---|---|---|---|---|---|---|---|---|
April 29, 2011 | 2 | CarolinaCon | 7 | http://www.carolinacon.org/ | 1 | G. Hardy | Tales From The Crypto | |
April 29, 2011 | 2 | CarolinaCon | 7 | http://www.carolinacon.org/ | 2 | Dr. Tran | How To Own And Protect Your Office Space | |
April 29, 2011 | 2 | CarolinaCon | 7 | http://www.carolinacon.org/ | 3 | Nick Fury | Serial Killers: Usb As An Attack Vector | |
April 29, 2011 | 2 | CarolinaCon | 7 | http://www.carolinacon.org/ | 4 | Adam Drew | Music And Audio Production With Free And Open Source Software | |
April 29, 2011 | 2 | CarolinaCon | 7 | http://www.carolinacon.org/ | 5 | Ryan Linn | Pig: Finding Truffles Without Leaving A Trace | |
April 29, 2011 | 2 | CarolinaCon | 7 | http://www.carolinacon.org/ | 6 | Deral Heiland | If You Own A Multi Function Printer (Mfp), Then I Own You | |
April 29, 2011 | 2 | CarolinaCon | 7 | http://www.carolinacon.org/ | 7 | Michael Goffin | Yara And Python: The Malware Detection Dynamic Duo | |
April 29, 2011 | 2 | CarolinaCon | 7 | http://www.carolinacon.org/ | 8 | Thomas (professorfarnsworth) | Do Personality Traits Increase The Likelihood That You Will Hack? | |
April 29, 2011 | 2 | CarolinaCon | 7 | http://www.carolinacon.org/ | 9 | Chris Teodorski | Kippos And Bits And Bits And Bits: Fun With Ssh Honeypotting | |
April 29, 2011 | 2 | CarolinaCon | 7 | http://www.carolinacon.org/ | 10 | Martin Bos | Why Your Password Policy Sucks | |
April 29, 2011 | 2 | CarolinaCon | 7 | http://www.carolinacon.org/ | 11 | Justin Troutman | Mackerel: A Progressive School Of Cryptographic Thought | |
April 29, 2011 | 2 | CarolinaCon | 7 | http://www.carolinacon.org/ | 12 | Branson Matheson | Ttl Of A Penetration | |
April 29, 2011 | 2 | CarolinaCon | 7 | http://www.carolinacon.org/ | 13 | Jordan Sissel | Logstash - Open Source Log And Event Management | |
April 29, 2011 | 2 | CarolinaCon | 7 | http://www.carolinacon.org/ | 14 | Gerry Brunelle | Dissecting The Hack: Malware Analysis 101 | |
April 29, 2011 | 2 | CarolinaCon | 7 | http://www.carolinacon.org/ | 15 | Lisa Lorenzin | Security Lessons From Cracking Enigma | |
April 29, 2011 | 2 | CarolinaCon | 7 | http://www.carolinacon.org/ | 16 | Jp Dunning | Hack From A Library With Katana |
date of conf | number of days | name of conf | Edition | conf URL | talk num | speaker | topic | slides |
---|---|---|---|---|---|---|---|---|
Feb. 18, 2011 | 0 | Security B-Sides Cleveland | 2011 | 1 | Dave Kennedy | Where We At? A Look At Information Security | ||
Feb. 18, 2011 | 0 | Security B-Sides Cleveland | 2011 | 2 | Steve Jaworski | Where'S The Flow? | ||
Feb. 18, 2011 | 0 | Security B-Sides Cleveland | 2011 | 3 | Mick Douglas | Blue Team Is Sexy -- Refocusing On Defense | ||
Feb. 18, 2011 | 0 | Security B-Sides Cleveland | 2011 | 4 | Jeff Kirsch | Please Step Away From The Binaries: Educating Security | ||
Feb. 18, 2011 | 0 | Security B-Sides Cleveland | 2011 | 5 | Gary Sheehan | Building An Effective It Grc Environment | ||
Feb. 18, 2011 | 0 | Security B-Sides Cleveland | 2011 | 6 | Steve Nosteve | Thicknet: It Does More Than Oracle |
date of conf | number of days | name of conf | Edition | conf URL | talk num | speaker | topic | slides |
---|---|---|---|---|---|---|---|---|
Jan. 7, 2011 | 0 | Security B-Sides MSP | 2011 | 1 | David Bryan | Pentesting For Fun And Profit | ||
Jan. 7, 2011 | 0 | Security B-Sides MSP | 2011 | 2 | Brian Johnson , Mike Jackson | Expert Witness Tampering: How Secure Are Your Forensic Image Files From Tampering And What Can We Do About It | ||
Jan. 7, 2011 | 0 | Security B-Sides MSP | 2011 | 3 | Barry Caplin | You Got Chocolate On My Ipad! - Toys In The Office | ||
Jan. 7, 2011 | 0 | Security B-Sides MSP | 2011 | 4 | Kevin Nassery | Oops, My Network Sucks | ||
Jan. 7, 2011 | 0 | Security B-Sides MSP | 2011 | 5 | Karl Fosaaen | Applying Email Spoofing To Sms Messages | ||
Jan. 7, 2011 | 0 | Security B-Sides MSP | 2011 | 6 | Glenn Leifheit | Building A Hacking Environment With Powershell | ||
Jan. 7, 2011 | 0 | Security B-Sides MSP | 2011 | 7 | Rachael Lininger | Conflict Resolution Style Preferences Of Information Security Professionals |
date of conf | number of days | name of conf | Edition | conf URL | talk num | speaker | topic | slides |
---|---|---|---|---|---|---|---|---|
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 1 | Daniel Peck | Lessons Learned From Running A Bug Bounty Program | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 2 | Mike Lloyd | Gone In 60 Keystrokes | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 3 | Hart Rossman | Security, Supply Chains, And You | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 4 | Aaron Cohen | Selling Security Without Selling Your Soul | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 5 | Ray Kelly | Screw The Tsa: Iíll Be Where I Want, And Getcredit For It! | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 6 | Gal Shpantzer | Security Domination Via Hard Drive Isolation | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 7 | Nick Selby | Post Attack: Working With Law Enforcement | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 8 | Brett Hardin , Mike Dahn | Being Sneaky About Security And Regulations Or Misdirection: The Rise And Fall And Rise Of Regulatory Compliance | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 9 | Joe Gottlieb , Dan Ritari , Andrew Hay | Open Security Intelligence: Art Of The Possible Or Science Of The Necessary? | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 10 | Song Liu | How To Attack Windows Kernel | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 11 | David Mortman | Cloud Security Realities | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 12 | Billy Rios | Tba | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 13 | Bringing Home The Love: Tips, Tricks And Quips On How To Organize A B-Sides Event In Your Town | |||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 14 | Andy Ellis | Letting Someone Else'S Phone Ring At 3 Am: Building Robust Incident Management Frameworks | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 15 | Brett Hardin | You Are Alone. Enjoy It. | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 16 | Hd Moore | When Csos Attack | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 17 | Anton Chuvakin | Something Fun About Using Siem And Not Failing Or Only Failing Non-Miserably Or Not-Too-Miserably | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 18 | Ivan Ristic | Stop Complaining And Solve A Security Problem Instead! | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 19 | Andrew Hay , Richard Bejtlich , Travis Reese , Amit Yoran | Attacking Cyber Security Marketecture | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 20 | Marc Eisenbarth | Active Exploitation Detection | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 21 | Andrew Hay , Dave Shackleford | A Brief History Of Hacking | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 22 | Damon Cortesi | Homo Developomicus - Developers Are Human Too | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 23 | Robert Zigweid | Threat Modeling: Learn To Optimize Your Security Budget | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 24 | Kevin Bankston , Marcia Hofmann , Kurt Opsahl , Eva Galperin , Chris Palmer , Julie Samuels | Ask The Eff | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 25 | Raffael Marty | Log Analysis And Visualization In The Cloud | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 26 | Scott Dunlop | Reverse Engineering Using The Android Emulator | ||
Feb. 14, 2011 | 1 | Security B-Sides San Francisco | 2011 | 27 | Davi Ottenheimer | Dr. Stuxlove Or: How I Learned To Stop Worrying And Love The Worm |
date of conf | number of days | name of conf | Edition | conf URL | talk num | speaker | topic | slides |
---|---|---|---|---|---|---|---|---|
March 9, 2011 | 2 | CanSecWest | 2011 | 1 | Dong-joo Ha , Ki-chan Ahn | Is Your Gaming Console Safe?: Embedded Devices, An Antivirus-Free Safe Hideout For Malware | ||
March 9, 2011 | 2 | CanSecWest | 2011 | 2 | Chris Eng , Brandon Creighton | Deconstructing Coldfusion | ||
March 9, 2011 | 2 | CanSecWest | 2011 | 3 | Dan Kaminski , Adam Cecchetti , Michael Eddington | Showing How Security Has (And Hasn'T) Improved, After Ten Years Of Trying | ||
March 9, 2011 | 2 | CanSecWest | 2011 | 4 | Aaron Portnoy , Logan Brown | Black Box Auditing Adobe Shockwave | ||
March 9, 2011 | 2 | CanSecWest | 2011 | 5 | Anonymous | Ipv6 Implementation And Security Round Table - A Moderated Disagreement Or A Chorus? | ||
March 9, 2011 | 2 | CanSecWest | 2011 | 6 | Andrea Barisani , Daniele Bianco | Chip & Pin Is Definitely Broken | ||
March 9, 2011 | 2 | CanSecWest | 2011 | 7 | Michael Ossmann | Project Ubertooth: Building A Better Bluetooth Adapter | ||
March 9, 2011 | 2 | CanSecWest | 2011 | 8 | Graeme Neilson | Welcome To Rootkit Country | ||
March 9, 2011 | 2 | CanSecWest | 2011 | 9 | Ilja Sprundel | Iphone And Ipad Hacking | ||
March 9, 2011 | 2 | CanSecWest | 2011 | 10 | Richard Johnson | A Castle Made Of Sand: Adobe Reader X Sandbox | ||
March 9, 2011 | 2 | CanSecWest | 2011 | 11 | Eric Filiol | Dymanic Cryptographic Trapdoors | ||
March 9, 2011 | 2 | CanSecWest | 2011 | 12 | Marcia Hofmann | The Law Of Web Application Hacking | ||
March 9, 2011 | 2 | CanSecWest | 2011 | 13 | Dustin Duran , Matt Miller , David Weston | Security Defect Metrics For Targeted Fuzzing | ||
March 9, 2011 | 2 | CanSecWest | 2011 | 14 | Nico Golde , Collin Mulliner | Sms-O-Death: From Analyzing To Attacking Mobile Phones On A Large Scale | ||
March 9, 2011 | 2 | CanSecWest | 2011 | 15 | Marc Schnefeld | Borken Fonts: The Story Of Naive Parsers And Attacker Controlled Reboots | ||
March 9, 2011 | 2 | CanSecWest | 2011 | 16 | Vincenzo Iozzo , Giovanni Gola | Stale Pointers Are The New Black | ||
March 9, 2011 | 2 | CanSecWest | 2011 | 17 | Nick Green | Grape: Generative Rule-Based Generic Stateful Fuzzing |
date of conf | number of days | name of conf | Edition | conf URL | talk num | speaker | topic | slides |
---|---|---|---|---|---|---|---|---|
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 1 | Bruce Schneier | Keynote: Cyberwar | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 2 | Patroklos Argyroudis , Dimitrios Glynos | Protecting The Core: Kernel Exploitation Mitigations | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 3 | Don Bailey | Attacking Microcontroller Environments From A Software Perspective | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 4 | Marco Balduzzi | Http Parameter Pollution Vulnerabilities In Web Applications | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 5 | Mihai Chiriac | Rootkit Detection Via Kernel Code Tunneling | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 6 | Claudio Criscione | You Are Doing It Wrong: Failures In Virtualization Systems | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 7 | Nitesh Dhanjani | New Age Attacks Against Apple'S Ios (And Countermeasures) | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 8 | Jason Geffner | Exporting Non-Exportable Rsa Keys | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 9 | Yuri Gushin , Alex Behar | Building Floodgates: Cutting-Edge Denial Of Service Mitigation | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 10 | George Hedfors | Owning The Data Centre Using Cisco Nx-Os Based Switches | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 11 | Vincenzo Iozzo | Workshop: The Mac Exploit Kitchen | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 12 | Tom Keetch | Escaping From Microsoft Windows Sandboxes | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 13 | Felix Lindner | Building Custom Disassemblers | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 14 | Rafal Los | Defying Logic - Theory, Design, And Implementation Of Complex Systems For Testing Application Logic | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 15 | Andrew Macpherson , Roelof Temmingh | Workshop: Extending Maltego With Your Applications, Scripts And Data. | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 16 | Wim Remes , Xavier Mertens | Workshop: Grepping For Gold | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 17 | Sebastian Muniz , Alfredo Ortega | Fuzzing And Debugging Cisco Ios | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 18 | Matthew Neely , Spencer Mcintyre | Eapeak - Wireless 802.1X Eap Identification And Foot Printing Tool | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 19 | Tom Parker | Stuxnet Redux: Malware Attribution & Lessons Learned | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 20 | Damir Rajnovic | Monoculture - The Other Side | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 21 | Wim Remes | Among The Blind, The Squinter Rules : Security Visualization In The Field. | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 22 | Andrès Riancho | Web Application Payloads | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 23 | Thomas Roth | Breaking Encryption In The Cloud: Gpu Accelerated Supercomputing For Everyone | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 24 | Justin Searle | Attacking And Defending The Smart Grid | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 25 | Justin Searle | Workshop: A Taste Of The Latest Samurai-Wtf Dvd | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 26 | Raul Siles | Sap: Session (Fixation) Attacks And Protections (In Web Applications) | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 27 | Chris Valasek , Ryan Smith | Exploitation In The Modern Era | |
March 17, 2011 | 1 | Blackhat Europe | 2011 | http://blackhat.com/html/bh-eu-11/bh-eu-11-home.html | 28 | Andreas Wiegenstein | The Abap Underverse - Risky Abap To Kernel Communication And Abap-Tunneled Buffer Overflows |
date of conf | number of days | name of conf | Edition | conf URL | talk num | speaker | topic | slides |
---|---|---|---|---|---|---|---|---|
April 7, 2011 | 2 | Hackito Ergo Sum | 2011 | 1 | Jon Oberheide , Dan Rosenberg | Kernel Fun Tba | ||
April 7, 2011 | 2 | Hackito Ergo Sum | 2011 | 2 | Joernchen | Ruby On Rails From A Code Auditorís Perspective | ||
April 7, 2011 | 2 | Hackito Ergo Sum | 2011 | 3 | Marc Heuse | Recent Advanced In Ipv6 Insecurities | ||
April 7, 2011 | 2 | Hackito Ergo Sum | 2011 | 4 | Aaron Portnoy , Logan Brown | Concentrated Fire: Black Box Auditing Adobe Shockwave | ||
April 7, 2011 | 2 | Hackito Ergo Sum | 2011 | 5 | Richard Johnson | A Castle Made Of Sand: Adobe Reader X Sandbox | ||
April 7, 2011 | 2 | Hackito Ergo Sum | 2011 | 6 | James Oakley , Sergey Bratus | Exploiting The Hard-Working Dwarf | ||
April 7, 2011 | 2 | Hackito Ergo Sum | 2011 | 7 | Itzik Kotler | Let Me Stuxnet You | ||
April 7, 2011 | 2 | Hackito Ergo Sum | 2011 | 8 | Tarjei Mandt | Kernel Pool Exploitation On Windows 7 | ||
April 7, 2011 | 2 | Hackito Ergo Sum | 2011 | 9 | Eloi Vanderbèken | Hackito Ergo Sum Crackme | ||
April 7, 2011 | 2 | Hackito Ergo Sum | 2011 | 10 | Rodrigo Branco | Behind The Scenes: Security Research | ||
April 7, 2011 | 2 | Hackito Ergo Sum | 2011 | 11 | Gabriel Gonzalez | Man-In-Remote: Pkcs11 For Fun And Non-Profit | ||
April 7, 2011 | 2 | Hackito Ergo Sum | 2011 | 12 | Jon Larimer | Autorun Attacks Against Linux | ||
April 7, 2011 | 2 | Hackito Ergo Sum | 2011 | 13 | Eric Freyssinet | Hacking Investigations In Practice | ||
April 7, 2011 | 2 | Hackito Ergo Sum | 2011 | 14 | Yuval Polevoy | Money Is In The Eye Of The Beholder: New And Exciting Ways To Steal Your Cash | ||
April 7, 2011 | 2 | Hackito Ergo Sum | 2011 | 15 | Mate Soos | Craking Industry Ciphers At A Whim | ||
April 7, 2011 | 2 | Hackito Ergo Sum | 2011 | 16 | Raoul Chiesa | Tba |
date of conf | number of days | name of conf | Edition | conf URL | talk num | speaker | topic | slides |
---|---|---|---|---|---|---|---|---|
April 16, 2011 | 1 | Infiltrate | 2011 | 1 | Dave Aitel | Infiltrate Welcome | ||
April 16, 2011 | 1 | Infiltrate | 2011 | 2 | Nico Waisman | Keynote - Creating Strategic Surprise In Information Security | ||
April 16, 2011 | 1 | Infiltrate | 2011 | 3 | Bas Alberts , Massimiliano Oldani | Rock'M Sock'M Robots: Exploiting The Android Attack Surface | ||
April 16, 2011 | 1 | Infiltrate | 2011 | 4 | Chris Valasek , Ryan Smith | Modern Heap Exploitation Using The Low Fragmentation Heap | ||
April 16, 2011 | 1 | Infiltrate | 2011 | 5 | Esteban Guillardoy | The Listening | ||
April 16, 2011 | 1 | Infiltrate | 2011 | 6 | Thomas Dullien | State Spaces And Exploitation | ||
April 16, 2011 | 1 | Infiltrate | 2011 | 7 | Ben Nagy | How To Fail At Fuzzing | ||
April 16, 2011 | 1 | Infiltrate | 2011 | 8 | Ronald Huizer | Don'T Give Credit: Hacking Arcade Machines | ||
April 16, 2011 | 1 | Infiltrate | 2011 | 9 | Cesar Cerrudo | Bypassing Windows Services Protections | ||
April 16, 2011 | 1 | Infiltrate | 2011 | 10 | Tarjei Mandt | Modern Kernel Pool Exploitation: Attacks And Techniques | ||
April 16, 2011 | 1 | Infiltrate | 2011 | 11 | Ms09-050 | Break Sponsored | ||
April 16, 2011 | 1 | Infiltrate | 2011 | 12 | Ryan Austin , Sean Arries | Infiltrating Php | ||
April 16, 2011 | 1 | Infiltrate | 2011 | 13 | Sean Heelan , Agustin Gianni | Attacking The Webkit Heap | ||
April 16, 2011 | 1 | Infiltrate | 2011 | 14 | Georg Wicherski | Fun With The Ldt: Fast & Generic Shellcode Detection |
date of conf | number of days | name of conf | Edition | conf URL | talk num | speaker | topic | slides |
---|---|---|---|---|---|---|---|---|
April 15, 2011 | 3 | Notacon | 8 | 1 | Project Ruori | Kinetic Music | ||
April 15, 2011 | 3 | Notacon | 8 | 2 | Catfood | Hacking The Man: Your Guide To The Courtroom | ||
April 15, 2011 | 3 | Notacon | 8 | 3 | Aestetix | The Greatest Show On Earth: How To Create, Populate, And Delegate A Successful Event | ||
April 15, 2011 | 3 | Notacon | 8 | 4 | Chris Anderson , Andrea Long | Corporate Evil: The Legal Way To Commit Fraud And Murder Or How I Learned To Stop Worrying And Love Corruption | ||
April 15, 2011 | 3 | Notacon | 8 | 5 | James Arlen , Tom Eston , Chris Clymer , Brandon Knight , Matthew Neely | Social Engineering Business Into Your Security | ||
April 15, 2011 | 3 | Notacon | 8 | 6 | James Arlen | I'Ll Take "Myrcurial" For $100 | ||
April 15, 2011 | 3 | Notacon | 8 | 7 | Randy Beiter | Keeping Secrets For Ios Developers | ||
April 15, 2011 | 3 | Notacon | 8 | 8 | Jp Bourget , Rob Fuller | Deep Magic 101: The Wizard'S First Rule | ||
April 15, 2011 | 3 | Notacon | 8 | 9 | Adrian Crenshaw | Funnypots And Skiddy Baiting | ||
April 15, 2011 | 3 | Notacon | 8 | 10 | Kizz Myanthia | Weaponizing The Smartphone: Deploying The Perfect Wmd | ||
April 15, 2011 | 3 | Notacon | 8 | 11 | Joncates , Jake Elliott , Tamas Kamenczy | Artgames Lan Party | ||
April 15, 2011 | 3 | Notacon | 8 | 12 | Kevin Johnson , Tom Eston | Social Zombies Gone Wild: Totally Exposed And Uncensored | ||
April 15, 2011 | 3 | Notacon | 8 | 13 | Dewzi | Preventing Viruses From Stds To .Exes | ||
April 15, 2011 | 3 | Notacon | 8 | 14 | Seth Hardy | Propane And Electrons | ||
April 15, 2011 | 3 | Notacon | 8 | 15 | David Kennedy | Strategic Penetration Testing - Changing The Way We Hack | ||
April 15, 2011 | 3 | Notacon | 8 | 16 | Jeff Kirsch , Ghostnomadjr | One Bad Cookie | ||
April 15, 2011 | 3 | Notacon | 8 | 17 | Jeff Kirsch | Educating Security Means A New Approach | ||
April 15, 2011 | 3 | Notacon | 8 | 18 | Alex Leitch | Laser Cutters: Not Only For Use On Your Remaining Eye | ||
April 15, 2011 | 3 | Notacon | 8 | 19 | Ryan Linn | Collecting Underpants To Win Your Network | ||
April 15, 2011 | 3 | Notacon | 8 | 20 | Darth Vader | Ssl Wars - The Dark Side Of Ssl | ||
April 15, 2011 | 3 | Notacon | 8 | 21 | Page Mckay | We Are All Game-Makers: An Everyman'S Approach To Game Development | ||
April 15, 2011 | 3 | Notacon | 8 | 22 | Kevin Nassery | Oh Shit: The Top Five Major F*!K Ups Of My Career, And How I Grew From Them. | ||
April 15, 2011 | 3 | Notacon | 8 | 23 | Matthew Neely | Pen Testing - Moving From Art To Science | ||
April 15, 2011 | 3 | Notacon | 8 | 24 | Nicolle Neulist | The Free Software Studio: Open-Source Tools For Musical Exploration And Composition | ||
April 15, 2011 | 3 | Notacon | 8 | 25 | Shane Nimbus , Michael Palumbo | Open Source Intelligence: The Legal Do'S And Don'Ts Of Digital Profiling | ||
April 15, 2011 | 3 | Notacon | 8 | 26 | Mike Olenik | Tabletop Game Design 101: Idea To Reality | ||
April 15, 2011 | 3 | Notacon | 8 | 27 | Alex Papadimoulis | Hacking The Workplace: How To Make The Most With The Least | ||
April 15, 2011 | 3 | Notacon | 8 | 28 | Joe Peacock | Art Of Akira | ||
April 15, 2011 | 3 | Notacon | 8 | 29 | Joe Peacock , Drew Curtis | You'Ll Get Over It: How Not To Redesign Fark | ||
April 15, 2011 | 3 | Notacon | 8 | 30 | Jon Peer | Geocaching 101 | ||
April 15, 2011 | 3 | Notacon | 8 | 31 | Christina Pei | Hacking The Classroom: How To Re-Make The Education System | ||
April 15, 2011 | 3 | Notacon | 8 | 32 | Rltvty | Hdr And Panoramic Photography | ||
April 15, 2011 | 3 | Notacon | 8 | 33 | Ed Quiggle | The Bleeding Edge Of Neurohacking | ||
April 15, 2011 | 3 | Notacon | 8 | 34 | Chris Sanyk | How I Finally Made My First Videogame | ||
April 15, 2011 | 3 | Notacon | 8 | 35 | Kaimen Searle , Justin Searle | The Ancient Sport Of Falconry | ||
April 15, 2011 | 3 | Notacon | 8 | 36 | Bill Sempf | Is Locksport A Sport? | ||
April 15, 2011 | 3 | Notacon | 8 | 37 | David Sieg | History Of Scanimate | ||
April 15, 2011 | 3 | Notacon | 8 | 38 | Mark Stanislav | Being A Puppet Master: Automating Amazon Ec2 With Puppet & Friends | ||
April 15, 2011 | 3 | Notacon | 8 | 39 | Mark Stanislav | It'S Vulnerableö Now What?: Three Diverse Tales Of Woe And Remediation |
date of conf | number of days | name of conf | Edition | conf URL | talk num | speaker | topic | slides |
---|---|---|---|---|---|---|---|---|
Feb. 25, 2011 | 1 | Nullcon | 2011 | 1 | Fyodor Yarochkin | No Bullshit On Underground Crime: Traces, Trends, Attribution, Techniques And More | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 2 | Saumil Shah | Lessons Learned From 2010 | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 3 | Rahul Sasi | Penetration Testing A Biometric System | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 4 | Shashidhar | Cyber Crime 101: Cost Of Cyber Crime, Trends And Analysis | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 5 | Dinesh Bareja | Incident Management And Beyond | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 6 | Deepak Rout | Enterprise Paradigm For Controlling Data Leakage | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 7 | Vishal Gupta | Protect Infrastructure Of Protect Information Ñ Lessons From Wikileaks | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 8 | Alok Vijayant | Information Warfare Ñ The Indian Perspective | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 9 | Pratap Reddy | Future Of Cyber Crimes: Limitations And Challenges | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 10 | Wolfgang Kandek | Vulnerabilities And Malware: Statistics And Research For Malware Identification | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 11 | Fyodor Yarochkin | Building An Intelligence Analysis Systems Using Open Source Tools | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 12 | Abhijeet Hatekar | Chupa Rustam | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 13 | Manu Zacharia | Security And Forensic Discovery In Cloud Environments | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 14 | Mikel Gastesi , Jose Esparza | Zeus Mitmo Ñ A Real Case Of Banking Fraud Through Mobile Phones | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 15 | Nilesh Sharma , Pulkit Mehndiratta | Botnet Detection Approach By Dns Behavior And Clustering Analysis | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 16 | Vishwas Sharma | Fuzzing With Complexities | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 17 | Harsimran Walia | Reversing Microsoft Patches To Reveal Vulnerable Code | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 18 | Assaf Nativ | Memory Analysis Ñ Looking Into The Eye Of The Bits | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 19 | Jeremy Brown | Exploiting Scada Systems | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 20 | Anurag Dhanda | Hacking The Parliament A Classic Social Engineering Attack | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 21 | Hari Prasad | Security Analysis Of Indiaís Electronic Voting Machines: Memoirs Of A Whistleblower | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 22 | Sunil Kumar | Automatic Program Analysis Using Dynamic Binary Instrumentation | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 23 | Gursev Kalra | Sslsmart Ñ Smart Ssl Cipher Enumeration | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 24 | Prashant Kv , Tamaghna Basu | Json Fuzzing: New Approach To Old Problems | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 25 | Aseem Jakhar | Jugaad Beta: Linux Thread Injection For Malware Poc | ||
Feb. 25, 2011 | 1 | Nullcon | 2011 | 26 | Chinmaya Kamal , Saurabh Sharma | Buffer Underrun Exploits |
date of conf | number of days | name of conf | Edition | conf URL | talk num | speaker | topic | slides |
---|---|---|---|---|---|---|---|---|
March 28, 2011 | 3 | TROOPERS | 2011 | 1 | Enno Rey | Opening Keynote | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 2 | Richard Thieme | Talking Only To Ourselves: The Dangers Of Refusing To Stop, Look And Listen | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 3 | Marco Slaviero | Cache On Delivery | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 4 | Mark Gall , Joachim L¸ken | Security And Regulatory Requirements For Public Cloud Offerings To Support Selected Customer Use Cases | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 5 | George Hedfors | Owning The Data Center Using Cisco Nx-Os | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 6 | Chris Gates | Attacking Oracle Web Applications With Metasploit | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 7 | Dmitry Sklyarov | Forging Canon Original Decision Data | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 8 | Mariano Croce | Your Crown Jewels Online Ñ Attacks To Sap Web Applications | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 9 | Julia Wolf | Omg Wtf Pdf Ñ What You Didnít Know About Acrobat | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 10 | Friedwart Kuhn , Michael Thumann | Integration Of The New German Id Card (Npa) In Enterprise Environments Ñ Prospects, Costs & Threats | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 11 | Chema Alonso | I Foca A .Mil Domain | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 12 | Graeme Neilson | Tales From The Crypt0 | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 13 | Rodrigo Branco | Dynamic Program Analysis And Software Exploitation: From The Crash To The Exploit Code | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 14 | Steve Dispensa , Marsh Ray | Ongoing Identity Weaknesses | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 15 | Meder Kydyraliev | Milking A Horse Or Executing Remote Code In Modern Java Web Frameworks | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 16 | Andre Egners | Future Directions In Malware Detection On Mobile Handsets | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 17 | Sergey Bratus , Edmond Rogers | Last Minute Change: Adventures In Scada | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 18 | Michael Schaefer , Matthias Luft | Security Reflections On Multi Function Devices | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 19 | Ravishankar Borgaonkar , Kevin Redon | Femtocell: Femtostep To The Holy Grail | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 20 | Annonymous | Risk Panel | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 21 | Felix Leder | Do You Know Whatís Happening In Your $Application? | ||
March 28, 2011 | 3 | TROOPERS | 2011 | 22 | Heiko Kirsch | Business Transparency Via Security Dashboards |
date of conf | number of days | name of conf | Edition | conf URL | talk num | speaker | topic | slides |
---|---|---|---|---|---|---|---|---|
Jan. 10, 2011 | 3 | FloCon | 2011 | 1 | Hiroshi Asakura , Kensuke Nakata , Shingo Kashima , Hiroshi Kurakami | Flows As A Toplogy Chart | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 2 | Joel Ebrahimi | From Data Collection To Actioní Achieving Rapid Identification Of Cyber Threats And Perpetrators | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 3 | Sid Faber | Garbage Collection: Using Flow To Understand Private Network Data Leakage | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 4 | Josh Goldfarb | Network Flow Data Analysis Using Graph Pattern Search | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 5 | Phil Groce | The Rayon Visualization Toolkit | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 6 | Randy Heins | Indexing Full Packet Capture Data With Flow | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 7 | Jeff Janies | Protographs: Graph-Based Approach To Netflow Analysis | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 8 | Jeff Janies , Michael Collins | Darkspace Construction And Maintenance | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 9 | Kazunori Kamiya | Not To Miss Small-Amount But Important Traffic | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 10 | Vojtech Krmicek , Tomas Plesnik | Detecting Botnets With Netflow | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 11 | Jeroen Massar | Using Flow For Other Things Than Network Data | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 12 | Cory Mazzola , Timothy Tragesser | Security Incident Discovery And Correlation On .Gov Networks | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 13 | John Mchugh | Detecting Long Flows | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 14 | Peter Mullarkey , Mike Johns , Ben Haley | Leveraging Other Data Sources With Flow To Identify Anomalous Network Behavior | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 15 | Christopher Poetzel | Dlp Detection With Netflow | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 16 | Dan Ruef | Analysis Pipeline | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 17 | Dan Ruef , Emily Sarneso | Incorporating Dynamic List Structures Into Yaf | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 18 | Bilal Shebaro , Jedidiah Crandall | Privacy Preserving Network Flow Recording | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 19 | Timothy Shimeall | Exploring The Interactions Between Network Data Analysis And Security Information/Event Management | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 20 | John Smith | Real Time Topology Based Flow Visualization | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 21 | George Warnagiris | Cert Virtual Flow Collection And Analysis | ||
Jan. 10, 2011 | 3 | FloCon | 2011 | 22 | Chris Nunnery , Rhiannon Weaver , Gautam Singaraju , Brent Kang | Entropy-Based Measurement Of Ip Address Inflation In The Waledac Botnet |
date of conf | number of days | name of conf | Edition | conf URL | talk num | speaker | topic | slides |
---|---|---|---|---|---|---|---|---|
April 20, 2011 | 2 | SOURCE Boston | 2011 | http://www.sourceconference.com/boston/ | 1 | Dan Guido | The Exploit Intelligence Project |
date of conf | number of days | name of conf | Edition | conf URL | talk num | speaker | topic | slides |
---|---|---|---|---|---|---|---|---|
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 1 | Franklin Kramer | Keynote - Cyber Conflicts: Challenging the Future | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 2 | Itzhak Avraham | Popping Shell on A(ndroid)RM Devices | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 3 | Ryan Barnett | XSS Street-Fight: The Only Rule Is There Are No Rules | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 4 | Dionysus Blazakis | The Apple Sandbox | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 5 | Tom Brennan , Ryan Barnett | Checkmate with Denial of Service | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 6 | Andrew Case | De-Anonymizing Live CDs through Physical Memory Analysis | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 7 | Sean Coyne | The Getaway: Methods and Defenses for Data Exfiltration | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 8 | Adrian Crenshaw | Identifying the true IP/Network identity of I2P service hosts | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 9 | Neil Daswani | Malware Distribution via Widgetization of the Web | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 10 | Mariano Croce | Your crown jewels online: Attacks to SAP Web Applications | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 11 | Mariano Croce , Jordan Santarsieri | WORKSHOP - Cyber-attacks to SAP platforms: The Insider Threat | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 12 | Michael Eddington | WORKSHOP - Peach Fuzzing | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 13 | Marc Eisenbarth | Active Exploitation Detection | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 14 | Chris Gates | Attacking Oracle Web Applications With Metasploit | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 15 | Cassio Goldschmidt | Responsibility for the Harm and Risk of Software Security Flaws | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 16 | Joe Grand | WORKSHOP - Hardware Reverse Engineering: Access, Analyze, and Defeat | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 17 | Chris Hadnagy | WORKSHOP: How to Hack Large Companies and Make Millions | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 18 | Rob Havelt , Bruno Oliveira | Hacking the Fast Lane: security issues with 802.11p, DSRC, and WAVE | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 19 | Giovanni Gola , Vincenzo Iozzo | Stale pointers are the new black | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 20 | Jon Larimer | Beyond AutoRun: Exploiting software vulnerabilities with removable storage | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 21 | Tarjei Mandt | Kernel Pool Exploitation on Windows 7 | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 22 | Laurent Oudot | Inglourious Hackerds: Targeting Web Clients | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 23 | Tom Parker | Stuxnet Redux: Malware Attribution & Lessons Learned | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 24 | David Perez , Jose Pico | A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 25 | Thomas Roth | Breaking encryption in the cloud: GPU accelerated supercomputing for everyone | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 26 | Jamie Schwettmann , Eric Michaud | How to Steal Nuclear Warheads Without Voiding Your Xbox Warranty | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 27 | Val Smith , Alexander Polyakov | Forgotten World: Corporate Business Application Systems | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 28 | Angelos Stavrou , Zhaohui Wang | Exploiting Smart-Phone USB Connectivity For Fun And Profit | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 29 | Matthieu Suiche | Your cloud in my pocket | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 30 | Bryan Sullivan | Hey You, Get Off Of My Cloud: Denial of Service in the *aaS Era | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 31 | Matthew Weeks | Counterattack: Turning the tables on exploitation attempts from tools like Metasploit | |
Jan. 16, 2011 | 1 | BlackHatDC | 2011 | https://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html | 32 | Ralf-Philipp Weinmann | The Baseband Apocalypse |
date of conf | number of days | name of conf | Edition | conf URL | talk num | speaker | topic | slides |
---|---|---|---|---|---|---|---|---|
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 1 | James Bidzos | Panel Discussion: Update on DNSSEC: A Discussion with the Experts | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 2 | Gary Mcgraw | Panel Discussion: Cyber War: How We Learned to Stop Worrying and Love the Cyber Bomb | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 3 | Dmitri Alperovitch | Panel Discussion: Advanced Persistent Threats: War Stories from the Front Lines | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 4 | Jeremiah Grossman | Top Website Vulnerabilities: Trends, Business Effects and How to Fight Them | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 5 | Caleb Sima | Don't Teach Developers Security | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 6 | Bruce Schneier | The Dishonest Minority: Security as Society's Enabler | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 7 | Ira Winkler | How to Recruit Spies on the Internet | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 8 | Rich Mogull , Chris Hoff | Cloudiquantanomidatumcon: The Infra/Info-Centric Debate in the Cloud | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 9 | Joseph Menn | Panel Discussion: Public, Meet Private: Lessons Learned in Chasing Cyber Crooks | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 10 | Jacob West , Brian Chess | Panel Discussion: Extreme Makeover: Open Source Edition | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 11 | Kevin Poulsen | From White Hat to Black - The Curious Case of Cybercrime Kingpin, Max Vision | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 12 | Alan Paller | Panel Discussion: The Seven Most Dangerous New Attack Techniques, and What's Coming Next | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 13 | Paul Kocher | Misconceptions of Security | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 14 | George Kurtz , Stuart Mcclure | Hacking Exposed - Exploiting the Cloud and Virtual Machines | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 15 | Brian Chess | Software Security: The Big Picture | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 16 | Bryan Sullivan , Michael Howard | Stop Exposing Yourself: Principles of Attack Surface Analysis and Reduction | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 17 | Jacob West | The Evolution of Software Security Assurance and its Relevance Today | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 18 | Peleus Uhley | Innovation in Application Security | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 19 | Sam King , Chris Wysopal | Intelligence on the Intractable Problem of Insecure Software | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 20 | Adrian Lane | Agile Development, Security Fail | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 21 | Alan Karp | Making Security Decisions Disappear into the User's Workflow | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 22 | James Anderson , James Christiansen | Security Business Cases: Fact and Fiction in Selling Security | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 23 | Hord Tipton | A Changing Industry: The 2011 Global Information Security Workforce Study | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 24 | Brian Sniffen | Scanning the Ten Petabyte Cloud: Finding the Malware that Isn't There | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 25 | Davi Ottenheimer | Cloud Investigations and Forensics | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 26 | Charlton Barreto , Hemma Prafullchandra | Trusted IaaS | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 27 | Rich Mogull | Everything You Ever Wanted to Know About DLP | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 28 | Bryan Sartin | Behind the Verizon Business 2010 Data Breach Investigations Report | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 29 | Julie Fitton | Thirty Thousand Records, Four Weeks, and No Time to Lose | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 30 | Michael Hall , Paul Reymann | Overlooked Security Threats of Data Recovery Operations | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 31 | Bruce Jones | A Practical Approach to Risk Management | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 32 | Miles Edmundson | The Psychology of Risk: Why Understanding Human Behavior is Essential | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 33 | Caroline Wong | Security Metrics: A Beginner's Guide | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 34 | Josh Corman , Alex Hutton | Metrics are Bunk!?: The Zombie Apocalypse, Baseball, and Security Metrics | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 35 | Bob Russo | Payment Data in 2011 and Beyond: Investigating Updates to the PCI Standards | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 36 | Abhilash Sonwane | Mapping an Organization's DNA Using Social Media | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 37 | Cliff Baker , Trevor Horwitz | Red Pill, Blue Pill – Prescriptions for Curing Compliance Complexity | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 38 | Eric Lybeck , Rick Siebenaler | Building a Global Privacy Program Leveraging Binding Corporate Rules | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 39 | Lukas Hasik , Jiri Sejtko | Browsing Known Sites is Safe – True or False? | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 40 | Gopinath K.n. | Wireless Vulnerabilities in the Wild: View from the Trenches | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 41 | Andrew Brandt | Why Johnny Can't Navigate Away from this iFrame: A PHP Malware Primer | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 42 | Gerhard Eschelbeck , David Compton | Aspire to a Network Free of Malicious Programs | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 43 | Dawn Cappelli , Joji Montelibano | Combat IT Sabotage: Technical Solutions from the CERT Insider Threat Lab | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 44 | Peter Robinson , Sean Parkinson | TLS Renegotiation Vulnerability | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 45 | Denis Maslennikov | Lightning Round: Mobile Security the Ugly Truth | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 46 | Adam Meyers | BlackBerry Security FUD Free | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 47 | Janice Neiderhofer | Luring Your Prey: The Art of Effectively Communicating with a Cyber Predator | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 48 | Henry Stern , Patrick Peterson | A Study on The State of Web Security | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 49 | Neil Daswani , Lars Ewe | Drive By Downloads: How to Avoid Getting a Cap Popped in Your App | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 50 | James Lyne | How Malware Authors Are Winning the War | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 51 | David Willson , Benjamin Tomhave | Ethical Considerations Involving the Use of Force in Cyberspace | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 52 | Karen Evans , Alan Paller | The U.S. Cyber Challenge: Developing the Next Generation of Cyber Guardians | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 53 | Keith Mularski , Jeff Bardin | The Machinery of Cybercrime: Uncut and Uncensored! | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 54 | Phillip Hallam-baker | The Manchurian Device Problem | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 55 | William Cheswick | Rethinking Passwords | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 56 | Peter Gutmann | PKI, Lemon Markets and Lemonade | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 57 | Eric Chabrow , David Matthews | Government Information Security: The State of the Union | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 58 | Ben Rothke | What Happens in Vegas Goes on YouTube: Security and Corporate Social Networks | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 59 | Frank Nagle | Loose Lips Sink Networks - Is Social Networking Making Your Network Insecure? | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 60 | Markus Jakobsson , Richard Chow | Trends in Mobile Authentication and Fraud Deterrence | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 61 | Jeff Bardin | Awareness for the ADD and ADHD Society | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 62 | Eric Ogren | Is it Time to Put HIPS in the Recycle Bin? | |
Feb. 15, 2011 | 3 | RSA | 2011 | http://web.archive.org/web/20111124203847/https://365.rsaconference.com/community/speakers | 63 | Jim Cebula | Risk and Resilience: Considerations for Information Security Risk Assessment |