[ :: mainpage :: register :: conference :: training :: call for papers (CFP) :: the venue ]

[ :: capture the flag (CTF) :: press/media :: conference agenda :: contact us ]

[ :: forum :: sponsors :: past conferences :: conference kit (PDF) ]

 

DAY 1

20Th September 2006

 

07.30

Registration

08.50

Welcome Address:

Mohd. Ali Hanafiah (Head of Content, Consumer and Network Security, MCMC)

09.00

Keynote Address: Schneier on Security (LIVE VIA WEBCAST)

Bruce Schneier (Chief Technology Officer, Counterpane Internet Security)

10.00

Ian Hellen & Vishal Kumar

Security Engineering in Windows Vista

11:00

Refreshment Break

 

 

TRACK I

TRACK II

       11:30

 
Thorsten Holz
Playing with Botnets for Fun and Profit
Paul Boehm 
Taming Bugs: The Art and Science of Writing 
Secure Code

      12:30

Networking Luncheon

13:15

 

Van Hauser
Attacking the IPv6 Protocol Suite
Fabrice Marie

Application Intrusion Prevention Systems: A new approach to protecting your data

14:15

Saumil Shah

Writing Metasploit Plugins - From Vulnerability to Exploit

Ching Tim Meng

X.805 Standard

15:15

Jonathan Limbo

The World Through the Eyes of a Signature Developer

Michael Davis

Client Honeypots - Its not only the network

16:15

Refreshment Break

16:30

Window Snyder

Firefox Security

Yen Ming Chen 

Triple Play; Triple Threats? IPTV Security

17:30

Marc Schonefeld
Pentesting Java/J2EE, discovering 
remote holes
Lisa Thalheim 
Visualization of Source Code for Auditing 

18:30

End of Day One

 

Note: As there are only 45 minutes allocated for lunch-break, attendees who are not dining in the hotel are urged to return promptly!

The event will continue ahead at 13:15 with or without you.

 

DAY 2

21ST September 2006

 

 

08.00

Registration

09.00

Keynote Address: What application security tools vendors don�t want you to know and holes they will never find!

Mark Curphey (VP, Foundstone Professional Services - a division of McAfee Inc.) with John Viega (Chief Security Architect, McAfee Inc.)

10:00  

Refreshment Break

 

 

 

TRACK I

TRACK II

10:30

 

Philippe Biondi & Arnaud Ebalard

Scapy and IPv6 networking

Nish Bhalla

Finding Secrets in ISAPI

11:30

 

Joanna Rutkowska

Subverting Vista Kernel for Fun and Profit

Raoul Chiesa
A new approach to Cybercrime: The Hacker�s 
Profiling Project (HPP)

12:30

Networking Luncheon

13:15

 

Douglas MacIver

Pen Testing Windows Vista BitLocker Drive Encryption from the Inside

Roberto Preatoni & Fabio Ghioni 
The Biggest Brother

14:15

Nguyen Anh Quynh 
Towards an Invisible Honeypot Monitoring Tool 

Jim Geovedi & Raditya Iryandi

Hacking a Bird in The Sky:

Hijacking VSAT Connections

15:15

Rohyt Belani 
Smashing the stack for profit -  period
Carlos Sarraute & Javier Burroni
Using Neural Networks and Statistical Machinery 
to Improve Remote OS Detection

16:15

Refreshment Break

16:30

Wes Brown 
MOSREF: Using Cryptography and 
Injectable Virtual Machines in Security 

The Grugq

VoIPhreaking: SIPhallis Unveiled

17:30

Anthony Zboralski

Hacking Trust - Security May Seem But Cannot Be

 

Fyodor Yarochkin & Meder Kydyraliev

Yet Another Web Application Testing 
Toolkit (YAWATT)

18:30

End of Day Two

20:30 onwards

HITBSECCONF2006 POST CONFERENCE PARTY

SPONSORED BY MICROSOFT CORP.

 

Note: As there are only 45 minutes allocated for lunch-break, attendees who are not dining in the hotel are urged to return promptly.

The event will continue ahead at 13:15 with or without you.