[ mainpage :: register :: conference :: training :: the venue ]
[ capture the flag (CTF) :: zone-h/hitb hacking challenge :: bzflag ]
[ call for papers (CFP) :: conference agenda :: sponsors :: press/media :: forum ]
[ conference kit (PDF) :: past conferences :: contact us ]

Keynote Videos Now Available for Download

Day 1 Keynote: Bruce Schneier - Schneier on Security
Day 2 Keynote: Jeremiah Grossman - Hacks Happen

Conference Agenda + Highlight Presentations

Filed under: Main Page — Administrator @ 10:40 pm

The conference agenda and PDF conference kit is now available online. Below are the list of presentations that attendees can look forward to seeing for the first time in the Middle East region!

Hijacking VSAT Connections - Jim Geovedi (Member of HERT & Security Consultant, PT Bellua Asia Pacific)

Defensive Network Security - Practical Methodologies Meling Mudin [spoonfork] and Lee Chin Sheng [geek00l] (Independent Network Security Researchers)

Advances in Intrusion Detection and Prevention - Christopher J. Rouland (IBM)

Virtualization != Security - Daniel S. Ingevaldson (IBM)

In-depth Anti-Forensics - Challenges of Steganography & Discovering Hidden Data - Domingo Montanaro

Cracking The GSM A5/1 Encryption in Seconds - Skyper & David Houlton

Hacking ‘Second Life’ - Michael Thumann

VoIP (in)Security - Italians Do It Better - Alessio ‘mayhem’ Pennasilico

How We Cracked Their Codes: A Case Study in Compromising the Most Popular High Security Lock in America - Medeco m3 and Biaxial - Marc Weber Tobias

For My Next Trick… Client-Side Hacking - Petko D. Petkov

Token Kidnapping - Cesar Ceurrudo

Penetration Testing SCADA and National Critical Infrastructure: Real-Life Experiences and Case Studies - Raoul Chiesa & Alessio ‘mayhem’ Pennasilico

Real World Attacks Against 3G Networks Using Subscriber Devices - Walter Goulet, Viviana Basso and Benjamin Hagen (Motorola Security Services)

Malware: Behavior, Tools, Scripting and Advanced Analysis - Ero Carrera

Securing Next Generation Applications – Scan, Detect and Mitigate - Shreeraj Shah

Hacking the Bluetooth Stack for Fun, Fame and Mayhem - Dino Covotsos

Cracking into Embedded Devices and Beyond! - Adrian ‘pagvac’ Pastor

Practical Oracle Forensics - Alexander Kornbrust

Hacking The Cell Architecture - Rodrigo Rubira Branco

Computer Forensics and Incident Response: Bringing Sexy Back - Jamie Butler

Do note that there are only a couple of more days before the early bird registration closes on the 1st of February 2008 so if you haven’t booked your seats, DO SO NOW as prices increase after the 1st… Additional updates to the agenda and conference speaker list will be made towards the end of February.

Event Organizer

Hack In The Box (M) Sdn. Bhd.

Event Partner



Supported & Endorsed By

UAE Telecommunications Regulatory Authority (TRA)

Malaysian Communications and Multimedia Commission (MCMC)

Malaysian Administrative Modernisation & Management Planning Unit

Platinum Sponsors

Titanium Sponsor (Post Conference Reception)


Gold Sponsors


Microsoft Corporation

Official Media Partner (Magazine)

Network Middle East

Arabian Computer News

ITP Business

Official Airline Partner

Emirates Airlines

Our Speakers are Supported By

Bellua Asia Pacific

Supporting Media:

Virus Bulletin

Virus Bulletin (VB)

InfoSec News

(ISN) InfoSec News

InfoSec News

XAKEP (Russia)

Insecure Magazine

PHRACK Magazine

Hakin9 Magazine

Supporting Organizations


ISECOM - Insititue for Security and Open Methodologies

ISACA Malaysia

IT Underground

X-Focus China

Zone-H Defacement Mirror

Xatrix Security

Special Interest Group in Security & Information InteGrity Singapore