Slide 1
Slide 1
Slide 1
Slide 1
Slide 1
Slide 1
Slide 1

ONLINE REGISTRATION CLOSES OCT 13TH AT 23:59 MYT

           

Walk in registrations at The InterContinental for the conference on 16th and 17th are still accepted (walk-in rate MYR1499).

For up-to-the-minute updates on #HITB2013KUL including on-site happenings during the event, please follow @hitbsecconf on Twitter.

Agenda – Conference Day 1 – 16th October 2013

TRACK 1 TRACK 2 HITB LABS
7:30 AM REGISTRATION / MORNING COFFEE
9:00 AM KEYNOTE 1 – Cognitive Injection: Reprogramming the Situation-Oriented Human OS

Andy Ellis (Chief Security Officer, Akamai)

10:00 AM COFFEE BREAK
10:30 AM
Hey Captain, Where’s Your Ship? Attacking Vessel Tracking Systems for Fun and Profit

Dr. Marco Balduzzi, Kyle Wihoit (Trend Micro) & Alessandro Pasta (Independet Researcher)

Under the Hood: How Actaeon Unveils Your Hypervisor

Mariano Graziano & Andrea Lanzi (Researchers, Eurecom Research Center)

Hunting for OS X Rootkits in Memory

Cem Gurkok (Threat Intelligence R&D Manager, Verizon Terremark)

11:30 AM
Android DDI: Dynamic Dalvik Instrumentation of Android Applications and Framework

Collin Mulliner (Researcher, Systems Security Lab, Northeastern University)

Using Online Activity as Digital DNA to Create a Better Spear Phisher

Joaquim Espinhara (Security Consultant, Trustwave) & Ulisses Albuquerque (Security Consultant, Trustwave)

12:30 PM LUNCH BREAK
1:30 PM
Practical Attacks Against Encrypted VoIP Communications

Dominic Chell (Director, MDSec) & Shaun Colley (Security Consultant, MDSec)

Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions

Andy Davis (Research Director, NCC Group)

Using Visualization to Analyze Malware

Wes Brown (Chief Architect, ThreatGRID)

2:30 PM
Demystifying Game Console Security: Over 10 Years of Ownage Unraveled

Peter ‘@bl4sty’ Geissler (Independent Security Researcher)

Owning a Cisco VOIP Environment: Exploiting the Call Manager

Francisco (IT Security Engineer, Lexfo)

3:30 PM COFFEE BREAK
4:00 PM
Defeating Signed BIOS Enforcement

Corey Kallenberg, John Butterworth & Xeno Kovah (The MITRE Corporation)

RFIDler: A Software Defined RFID Reader/Writer/Emulator

Adam Laurie (Director, Aperture Labs)

Sending Out An SOS: Session Origin Security

Mike Shema (Director of Engineering, Qualys)

5:00 PM
Hacking Corporations Using Unconventional Chained Exploits

Gianni Gnesa (Security Researcher, Ptrace Security)

TCP Idle Scans in IPv6

Mathias Morbitzer (Masters Student, Radboud University Nijmegen)

6:00 PM END
OS / SOFTWARE EMBEDDED NETWORK EXPLOIT
GENERAL HACK FU MOBILE WEB

EVENT ORGANIZER

SUPPORTED AND ENDORSED BY

TITANIUM SPONSOR (SPEAKERS RECEPTION + POST CONFERENCE RECEPTION)

GOLD SPONSORS

SILVER SPONSORS

CTF SPONSOR

CTF PRIZE SPONSOR

INTERNET CONNECTIVITY PARTNER

ALCO_PWN SPONSOR (POST CONFERENCE RECEPTION)

HackWEEKDAY Official Ride Partner

SUPPORTING MEDIA

FRIENDS OF HITB

Copyright © 2013 Hack In The Box | http://www.hackinthebox.org