[ :: mainpage :: register :: conference :: training :: call for papers (CFP) :: the venue ]
[ :: capture the flag (CTF) :: press/media :: conference agenda :: contact us ]
[ :: forum :: sponsors :: past conferences :: conference kit (PDF) ]
20Th September 2006
07.30 |
Registration |
08.50 |
Welcome Address:Mohd. Ali Hanafiah (Head of Content, Consumer and Network Security, MCMC) |
09.00 |
Keynote Address: Schneier on Security (LIVE VIA WEBCAST)Bruce Schneier (Chief Technology Officer, Counterpane Internet Security) |
10.00 |
Ian Hellen & Vishal KumarSecurity Engineering in Windows Vista |
11:00 |
Refreshment Break |
|
TRACK I |
TRACK II |
11:30 |
Thorsten Holz
Playing with Botnets for Fun and Profit
|
Paul Boehm
Taming Bugs: The Art and Science of Writing
Secure Code
|
12:30 |
Networking Luncheon |
|
13:15
|
Van Hauser
Attacking the IPv6 Protocol Suite
|
Fabrice Marie
Application Intrusion Prevention Systems: A new approach to protecting your data |
14:15 |
Writing Metasploit Plugins - From Vulnerability to Exploit |
X.805 Standard |
15:15 |
The World Through the Eyes of a Signature Developer |
Client Honeypots - Its not only the network |
16:15 |
Refreshment Break |
|
16:30 |
Firefox Security |
Yen Ming Chen
Triple Play; Triple Threats? IPTV Security |
17:30 |
Marc Schonefeld
Pentesting Java/J2EE, discovering
remote holes
|
Lisa Thalheim
Visualization of Source Code for Auditing
|
18:30 |
End of Day One |
08.00 |
Registration |
09.00 |
Keynote Address: What application security tools vendors don�t want you to know and holes they will never find!Mark Curphey (VP, Foundstone Professional Services - a division of McAfee Inc.) with John Viega (Chief Security Architect, McAfee Inc.) |
10:00 |
Refreshment Break |
|
TRACK I |
TRACK II |
10:30 |
Philippe Biondi & Arnaud Ebalard Scapy and IPv6 networking |
Finding Secrets in ISAPI |
11:30 |
Subverting Vista Kernel for Fun and Profit |
Raoul Chiesa
A new approach to Cybercrime: The Hacker�s
Profiling Project (HPP)
|
12:30 |
Networking Luncheon |
|
13:15
|
Pen Testing Windows Vista BitLocker Drive Encryption from the Inside |
Roberto Preatoni & Fabio Ghioni
The Biggest Brother
|
14:15 |
Nguyen Anh Quynh
Towards an Invisible Honeypot Monitoring Tool
|
|
15:15 |
Rohyt Belani
Smashing the stack for profit - period
|
Carlos Sarraute & Javier Burroni
Using Neural Networks and Statistical Machinery
to Improve Remote OS Detection
|
16:15 |
Refreshment Break |
|
16:30 |
Wes Brown
MOSREF: Using Cryptography and
Injectable Virtual Machines in Security
|
VoIPhreaking: SIPhallis Unveiled |
17:30 |
Hacking Trust - Security May Seem But Cannot Be
|
Fyodor Yarochkin & Meder Kydyraliev Yet Another Web Application Testing
Toolkit (YAWATT)
|
18:30 |
End of Day Two |
|
20:30 onwards |
HITBSECCONF2006 POST CONFERENCE PARTY SPONSORED BY MICROSOFT CORP. |