Agenda – Conference Day 1 – 16th October 2013
Training Day 1 | Training Day 2 | Conference Day 1 | Conference Day 2 | PDF (Conference Day 1 & 2) |
TRACK 1 | TRACK 2 | HITB LABS | |
7:30 AM | REGISTRATION / MORNING COFFEE | ||
9:00 AM | KEYNOTE 1 – Cognitive Injection: Reprogramming the Situation-Oriented Human OS
Andy Ellis (Chief Security Officer, Akamai) |
||
10:00 AM | COFFEE BREAK | ||
10:30 AM | |||
Hey Captain, Where’s Your Ship? Attacking Vessel Tracking Systems for Fun and Profit
Dr. Marco Balduzzi, Kyle Wihoit (Trend Micro) & Alessandro Pasta (Independet Researcher) |
Under the Hood: How Actaeon Unveils Your Hypervisor
Mariano Graziano & Andrea Lanzi (Researchers, Eurecom Research Center) |
Hunting for OS X Rootkits in Memory
Cem Gurkok (Threat Intelligence R&D Manager, Verizon Terremark) |
|
11:30 AM | |||
Android DDI: Dynamic Dalvik Instrumentation of Android Applications and Framework
Collin Mulliner (Researcher, Systems Security Lab, Northeastern University) |
Using Online Activity as Digital DNA to Create a Better Spear Phisher
Joaquim Espinhara (Security Consultant, Trustwave) & Ulisses Albuquerque (Security Consultant, Trustwave) |
||
12:30 PM | LUNCH BREAK | ||
1:30 PM | |||
Practical Attacks Against Encrypted VoIP Communications
Dominic Chell (Director, MDSec) & Shaun Colley (Security Consultant, MDSec) |
Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions
Andy Davis (Research Director, NCC Group) |
Using Visualization to Analyze Malware
Wes Brown (Chief Architect, ThreatGRID) |
|
2:30 PM | |||
Demystifying Game Console Security: Over 10 Years of Ownage Unraveled
Peter ‘@bl4sty’ Geissler (Independent Security Researcher) |
Owning a Cisco VOIP Environment: Exploiting the Call Manager
Francisco (IT Security Engineer, Lexfo) |
||
3:30 PM | COFFEE BREAK | ||
4:00 PM | |||
Defeating Signed BIOS Enforcement
Corey Kallenberg, John Butterworth & Xeno Kovah (The MITRE Corporation) |
RFIDler: A Software Defined RFID Reader/Writer/Emulator
Adam Laurie (Director, Aperture Labs) |
Sending Out An SOS: Session Origin Security
Mike Shema (Director of Engineering, Qualys) |
|
5:00 PM | |||
Hacking Corporations Using Unconventional Chained Exploits
Gianni Gnesa (Security Researcher, Ptrace Security) |
TCP Idle Scans in IPv6
Mathias Morbitzer (Masters Student, Radboud University Nijmegen) |
||
6:00 PM | END |
OS / SOFTWARE | EMBEDDED | NETWORK | EXPLOIT | ||||
---|---|---|---|---|---|---|---|
GENERAL HACK FU | MOBILE | WEB |