Day 2 • August 2, 2007 |
08:00 - 09:00 |
Registration and Continental Breakfast: Fourth Floor Palace Tower Promenade sponsored by |
|
|
|
Location & Times |
Good Stuff
|
Hardware
|
Reverse Engineering
|
Fuzzing & Testing
|
Application Security
|
Zero Day Defense
|
Policy, Management and the Law
|
Human Network
|
Turbo Talks
|
Augustus 5+6
|
Augustus 3+4
|
Augustus 1+2
|
Palace 2
|
Palace 1
|
Palace 3
|
Tiberius Ballroom 1+2+5+6
|
Claudius 3+4
|
Tiberius Ballroom 3+4+7+8
|
09:00 - 09:50 |
Keynote: The Psychology of Security
Bruce Schneier
|
09:50 - 10:00 |
Break & Booksigning with Bruce Schneier, author of "Beyond Fear" and "Secrets & Lies" |
10:00 - 11:00 |
Vista Network Attack Surface Analysis and Teredo Security Implications
Jim Hoagland
|
Hacking the Extensible Firmware Interface
John Heasman
|
Covert Debugging: Circumventing Software Armoring Techniques
Danny Quist & Valsmith
|
Exposing Vulnerabilities in Media Software
David Thiel
|
Building and Breaking the Browser
Window Snyder & Mike Shaver
|
Simple Solutions to Complex Problems from the Lazy Hacker’s Handbook
David Maynor & Robert Graham
|
Computer and Internet Security LawA Year in Review 20062007
Robert W. Clark
|
Closed
|
Social Network Site Data Mining
Stephen Patton
|
10:00 - 10:20
|
Point, Click, RTPInject
Zane Lackey, & Alex Garbutt
|
10:30 - 10:50
|
11:00 - 11:15 |
Coffee Service: Fourth Floor Palace Tower Promenade sponsored by |
|
|
Booksigning with Chris Wysopal, Dino Dai Zovi & Lucas Nelson, authors of "The Art of Software Security Testing"
|
|
11:15 - 12:30 |
Stealth Secrets of the Malware Ninjas
Nick Harbour
|
Injecting RDS-TMC Traffic Information Signals a.k.a. How to freak out your Satellite Navigation
Andrea Barisani & Daniele Bianco
|
The Art of Unpacking
Mark Vincent Yason
|
Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing
Jared DeMott, Dr. Richard Enbody & Dr. Bill Punch
|
The Little Hybrid Web Worm that Could
Billy Hoffman & John Terrill
|
A Dynamic Technique for Enhancing the Security and Privacy of Web Applications
Ezequiel D. Gutesman & Ariel Waissbein
|
Disclosure and Intellectual Property Law: Case Studies
Jennifer Granick
|
Meet the VCs
Panel
|
Just Another Windows Kernel Perl Hacker
Joe Stewart
|
11:15 - 11:35
|
The Security Analytics Project: Alternatives in Analysis
Mark Ryan del Moral Talabis
|
11:45 - 12:05
|
Unforgivable Vulnerabilities
Steve Christey
|
12:15 - 12:35
|
12:30 - 13:45 |
Lunch: Pavilion at Caesars sponsored by
|
|
|
Booksigning with Neal Krawetz, author of "Introduction to Network Security"
|
|
13:45 - 15:00 |
Estonia: Information Warfare and Strategic Lessons
Gadi Evron
|
RFIDIOts!!! Practical RFID Hacking (Without Soldering Irons or Patent Attorneys)
Adam Laurie
|
PyEmu: A multi-purpose scriptable x86 emulator
Cody Pierce
|
Blind Security TestingAn Evolutionary Approach
Scott Stender
|
Active Reversing: The Next Generation of Reverse Engineering
Greg Hoglund
|
Sphinx: An Anomaly-based Web Intrusion Detection System
Damiano Bolzoni & Emmanuel Zambon
|
Greetz from Room 101
Kenneth Geers
|
Spyware 2010: Center for Democracy & Technology Anti-Spyware Coalition
Panel
|
Reflection DNS Poisoning
Jerry Schneider
|
13:45 - 14:05
|
Type Conversion Errors: How a Little Data Type Can Do a Whole Lot of Damage
Jeff Morin
|
14:15 - 14:35
|
Hacking Capitalism
Dave G., & Jeremy Rauch
|
14:45 - 15:05
|
15:00 - 15:15 |
Coffee Service: Fourth Floor Palace Tower Promenade sponsored by
|
|
|
Booksigning with Brian Chess & Jacob West, authors of "Secure Programming with Static Analysis"
|
|
15:15 - 16:30 |
Meet the Fed
Jim Christy
|
Strengths and Weaknesses of Access Control Systems
Eric Schmiedl & Mike Spindel
|
Breaking C++ Applications
Mark Dowd, John McDonald, Neel Mehta
|
Fuzzing Sucks! (or Fuzz it Like you Mean it!)
Pedram Amini & Aaron Portnoy
|
Heap Feng Shui in JavaScript
Alexander Sotirov
|
(un)Smashing the Stack
Shawn Moyer
|
Building an Effective Application Security Practice on a Shoestring Budget
David Coffey & John Viega
|
Defeating Information Leak Prevention
Eric Monti & Dan Moniz
|
Reversing MSRC Updates: Case Studies of MSRC Bulletins 20042007
Greg Wroblewski
|
15:15 - 15:35
|
Longhorn Server Foundation & Server Roles
Iain McDonald
|
15:45 - 16:05
|
Practical Sandboxing - Techniques for Isolating Processes
David LeBlanc
|
16:15 - 16:35
|
16:30 - 16:45 |
Coffee & Ice Cream Service: Fourth Floor Palace Tower Promenade sponsored by |
|
|
|
16:45 - 18:00 |
Status of Cell Phone Malware in 2007
Mikko Hypponen
|
Side Channel Attacks (DPA) and Countermeasures for Embedded Systems
Job De Haas
|
Reversing C++
Paul Vincent Sabanal
|
Iron Chef Blackhat
Brian Chess, Jacob West, Sean Fay & Toshinari Kureha
|
Defeating Web Browser Heap Spray Attacks
Stephan Chenette & Moti Joseph
|
Static Detection of Application Backdoors
Chris Wysopal & Chris Eng
|
Smoke 'em Out!
Rohyt Belani & Keith Jones
|
Ethics Challenge!
Panel
|
Hacking Leopard: Tools and techniques for attacking the newest Mac OS X
Charlie Miller
|
16:45 - 17:05
|
RFID for Beginners++
Chris Paget
|
17:15 - 17:35
|
Reverse Engineering Automation with Python
Ero Carrera
|
17:45 - 18:05
|