Agenda – Conference Day 1 – 10th April 2013
Training Day 1 | Training Day 2 | Conference Day 1 | Conference Day 2 | PDF (Conference Day 1 & 2) |
TRACK 1 | TRACK 2 | TRACK 3 / HITB LABS | |
7:30 AM | REGISTRATION / MORNING COFFEE | ||
9:00 AM | KEYNOTE 1: Embracing the Uncertainty of Advanced Hacks with Big Data Analytics
Edward Schwartz (Chief Information Security Officer, RSA) |
||
10:00 AM | COFFEE BREAK | ||
10:30 AM | |||
Security Response in the Age of Mass Customized Attacks
Peleus Uhley (Platform Security Strategist, Adobe SSET) & Karthik Raman (Security Researcher, Adobe SSET) |
Papparazi Over IP
Daniel Mende (ERNW GmbH) |
Windows x64: The Essentials
Didier Stevens (Security Consultant, Contraste BV) |
|
11:30 AM | |||
SSRF PWNs: New Techniques and Stories
Vladimir Vorontsov (Founder, ONSec) & Alexander Golovko (Security Expert, ONSec) |
Orchestrating a Fire Sale: Bringing Dutch Alarm Systems to Their Knees
Wilco Baan Hofman (Reverse Engineer) |
||
12:30 PM | LUNCH BREAK | ||
1:30 PM | |||
Nifty Tricks and Sage Advice for Shellcode on Embedded Systems
Travis Goodspeed (Independent Security Researcher) |
Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel
Nikita Tarakanov (Independent Information Security Resarcher) |
Defending the Enterprise the Russian Way
Fyodor Yarochkin, Vladimir Kropotov & Sergey Soldatov (Independent Security Researchers) |
|
2:30 PM | |||
Defeating the Intercepting Web Proxy – A Glimpse Into the Next Generation of Web Security Tools
Petko D. Petkov (Founder, GnuCItizen) |
Virtually Secure: Analysis to Remote Root 0day in an Industry Leading SSL-VPN Appliance
Tal Zeltzer (independent Security Researcher) |
||
3:30 PM | COFFEE BREAK | ||
4:00 PM | |||
Page Fault Liberation Army or Better Security Through Creative x86 Trapping
Sergey Bratus (Asst. Professor, Dartmouth College) & Julian Bangert (Junior, Dartmouth College) |
LTE Pwnage: Hacking HLR/HSS and MME Core Network Elements
Philippe Langlois (Founder, P1 Security / Telecom Security Task Force [TSTF]) |
Hack Like it’s 2013
Itzik Kotler (Independent Consultant) |
|
5:00 PM | |||
Aircraft Hacking: Practical Aero Series
Hugo Teso (Security Consultant, n.runs AG) |
Abusing Twitter’s API and OAuth Implementation
Nicolas Seriot (Mobile Applications Developer, Swissquote Bank) |
||
6:00 PM | END |
OS / SOFTWARE | HARDWARE / EMBEDDED | ANALYSIS | |||
---|---|---|---|---|---|
GENERAL HACK FU | MOBILE | CRYPTO |