AGENDA DAY 1

29th October 2008

 

07.30

REGISTRATION

09.00

Keynote Address 1: The Art of Click-Jacking
Jeremiah Grossman

Founder & Chief Technology Officer, WhiteHat Security.

10.00

Keynote Address 2: Cyberwar is Bullshit
Marcus Ranum

Chief Security Officer, Tenable Network Security 

11:00

COFFEE BREAK

 

TRACK I

TRACK II

TRACK III
HITB LAB

11:30

Delivering Identity Management 2.0 by Leveraging OPSS
Thomas Varghese (Oracle Corporation)

Bluepilling the Xen Hypervisor 

Alexander Tereshkin (Senior Researcher, Inivisble Things Labs)

12:30

LUNCH BREAK

13:15

Pass the Hash Toolkit for Windows

Hernan Ochoa (Senior Security Consultant, Core Security Technology)

Internet Explorer 8 - Trustworthy Engineering and Browsing

Eric Lawrence (Security Program Manager, Microsoft Corporation)

  

14:15

Full Process Reconsitution from Memory

Peter Silberman (Engineer, Mandiant Inc.)

Hacking Internet Kiosks

Paul Craig (Principal Security Consultant, Security-Assessment.com)

Advanced Network Forensics Lab - PART 1

Meling Mudin [spoonfork] and Lee Chin Shing [geek00l] (Independent Network Security Researchers)

15:15

Analysis and Visualization of Common Packers

Ero Carrera (Reverse Engineering Automation Engineer, zynamics GmbH)

A Fox in the Hen House - UPnP IGD 

Jonathan Squire (Founder, Information Security Group)

Advanced Network Forensics Lab - PART 2

Meling Mudin [spoonfork] and Lee Chin Shing [geek00l] (Independent Network Security Researchers)

16:15

COFFEE BREAK

16:30

MoocherHunting: Real-Time Geo-Location of Moochers, Hackers and Unauthorized WiFi Users

Julian Ho (Chief Operating Officer, THINKSecure Pte. Ltd.)

Browser Exploits: A New Model for Browser Security 

Saumil Shah (Founder/CEO Net-Square Solutions)

Advanced Lockpicking Lab - PART 1

Q, Deviant Olam and Eric Michaud (TOOOL USA)

17:30

Mac OS Xploitation

Dino Dai Zovi (Independent Network Security Researcher)

Time for a Free Hardware Foundation? 

Roberto Preatoni (Founder, Zone-H and WSLabi)

Advanced Lockpicking Lab - PART 2

Q, Deviant Olam and Eric Michaud (TOOOL USA)

18:30

Hacking a Bird in The Sky 2.0

Jim Geovedi and Raditya Iryandi (Security Consultants at PT Bellua Asia Pacific)

How the Leopard Hides His Spots - OS X Anti-Forensics Techniques 

The Grugq (Independent Network Security Researcher)

19:30

END

AGENDA DAY 2

30th October 2008

 

07.30

REGISTRATION

09.00

Keynote Address 3: Welcome to the 0wned World
Dr. Anton Chuvakin

Chief Research Officer, Log Logic Inc.

10.00

Keynote Address 4: Dissolving an Industry as a Hobby
Peter Sunde [brokep] and Fredrik Neij [TiAMO]

Founders of The Pirate Bay - TPB 

11:00

COFFEE BREAK

 

TRACK I

TRACK II

TRACK III
HITB LAB

11:30

Pushing the Camel Through the Eye of a Needle 

Charl van der Walt (Founder / Managing Director, Sensepost)

An Effective Methodology to Enable Security Evaluation at RTL Level 
and Automate Vulnerability Detection in Future Hardware

Mary Yeoh (Security Evaluation Lead, Intel Security Center of Excellence [SeCoE])

12:30

LUNCH BREAK

13:30

Remote Code Execution Through Intel CPU Bugs

Kris Kaspersky (Independent Network Security Researcher and Author for XAKEP Magazine)

Next Generation Reverse Shell

AR (Independent Network Security Researcher)

  

Bluetooth, 802.11 & RFID Lab - PART 1

Q (HacDC) and King Tuna (Independent Network Security Researcher)

14:30

iPwning the iPhone

Charlie Miller (Principal Analyst, Independent Security Evaluators)

How to Build Your Own Password Cracker with a Disassembler
and a Little VM Magic

Matthew Geiger (Forensics Specialist, CERT US)

Bluetooth, 802.11 & RFID Lab - PART 2

Q (HacDC) and King Tuna (Independent Network Security Researcher)

15:30

Decompilers and Beyond

Ilfak Guilfanov (Founder/CEO Hex-Rays SA and Creator of IDA Pro)

Cracking into Embedded Devices and Beyond! 

Adrian �pagvac� Pastor (ProCheckUp Ltd. / GNUCITIZEN)

Detecting and Removing Malware Without Anti-Virus Software - PART 1

Ching Tim Meng (Independent Network Security Researcher)

16:30

COFFEE BREAK

17:00

Client-side Security

Petko D. Petkov (Founder, GNUCITIZEN and House of Hackers)

Top 10 Web 2.0 Attacks 

Shreeraj Shah (Founder Blueinfy)

Detecing and Removing Malware
Without Anti-Virus Software - PART 2

Ching Tim Meng (Independent Network Security Researcher)

18:00

CTF PRIZE GIVING + CHARITY AUCTION IN AID OF PR4A (CHILDREN WITH AUTISM)

19:00

END