[prev in list] [next in list] [prev in thread] [next in thread]
List: webappsec
Subject: Final EUSecWest 2008 Speakers London May 21/22
From: Dragos Ruiu <dr () kyx ! net>
Date: 2008-05-09 4:27:25
Message-ID: 200805082127.25729.dr () kyx ! net
[Download RAW message or body]
The selected papers for EUSecWest 2008 are:
* PhlashDance, discovering permanent denial of service attacks against
embedded systems - Rich Smith, HP Labs
* Attacking Near Field Communications (NFC) Mobile Phones - Collin Muliner,
trifinite
* Abusing X.509 certificate features - Alexander Klink, Cynops GmbH
* Phoenix, and automated vulnerability finding - Tim Burrell, Microsoft
* Cisco IOS Rootkits - Sebastian Muņiz, Core
* Advances in attacking interpreted languages - Justin Ferguson, IOActive
* One Token to Rule Them All: Post-Exploitation Fun in Windows Environments
- Luke Jennings, MWR InfoSecurity
* Building the bridge between the Web Application and the OS: GUI access
through SQL Injection - Alberto Revelli, Portcullis
* Satellite Systems - Adam Laurie, RFIDIOt.org
* Browser Exploits - Attacks and Defense - Saumil Shah, Net Square
* WebSphere MQ Security - Martyn Ruks, MWR InfoSecurity
Paper synopses are now up on the website.
This year there will be three Security Masters Dojo courses
on May 19/20, including a new course from Foundstone:
* Ultimate Web Hacking - Nick Murison, Foundstone, a division of McAfee
* Advanced Honeypot Tactics - Thorsten Holz, Aachen University
* The Exploit Laboratory - Advanced Edition Saumil Shah and Christopher Owen
Net-Square and Consault
cheers,
--dr
--
World Security Pros. Cutting Edge Training, Tools, and Techniques
London, U.K. May 21/22 - 2008 http://eusecwest.com
pgpkey http://dragos.com/ kyxpgp
-------------------------------------------------------------------------
Sponsored by: Watchfire
Methodologies & Tools for Web Application Security Assessment
With the rapid rise in the number and types of security threats, web application \
security assessments should be considered a crucial phase in the development of any \
web application. What methodology should be followed? What tools can accelerate the \
assessment process? Download this Whitepaper today!
https://www.watchfire.com/securearea/whitepapers.aspx?id=70170000000940F
-------------------------------------------------------------------------
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic