Interact with the security community
CanSecWest, the world's most advanced conference focusing on applied digital security, is about bringing the industry luminaries together in a relaxed environment which promotes collaboration and social networking. The conference lasts for three days and features a single track of thought provoking presentations, each prepared by an experienced professional and talented educator who is at the cutting edge of his or her field. We give preference to new and innovative material, highlighting important, emergent technologies, techniques, or best industry practices.
The conference is single track, with one hour presentations over the duration beginning at 9:00 a.m. The registration fee includes the catered meals, and there will be a vendor display and lounge/eating area, where wireless internet access will be available (as well as in the speaking theater). The conference discount hotel room booking system can be found here.
Some agenda announcements:
- Keynote: DARPA's Peiter "mudge" Zatko
- Facebook's Ryan McGeehan and Chad Greene will be talking about an unusual incident at the beginning of 2012
- Vladimir Katalov, ElcomSoft,@vkatalov Cracking and analyzing Apple iCloud backups, Find My iPhone, document storage.
- Stephan Esser @i0n1c will be talking about iOS
- Joshua J. Drake @jduck1337 - An Android Hacker's Journey: Challenges in Android Security Research
- Oded Horovitz and Steve Weis @sweis - Physical Privilege Escalation and Mitigation in the x86 world.
- Mike "dd" Eddington @sockstail will be talking about "Godel's Gourd. Fuzzing for logic issues"
- Yu Yang "tombkeeper" will be talking about DEP/ASLR bypass without ROP/JIT
- Peter Vreugdenhil @WTFuzz will be talking about the Adobe Reader XI Sandbox.
- @beist will be talking about Smart TV Security
- Rahul Sasi @fb1h2s - SMS to Meterpreter, Fuzzing USB Modems
- James Forshaw @tiraniddo - Reflecting on Reflection: Exploiting Reflection Vulns in Managed Languages (Java, .NET)
- Yuriy Bulygin, McAfee - Evil Maid Just Got Angrier: Why Full-Disk Encryption With TPM is Insecure on Many Systems
- Rob Beck - MS-SQL Post Exploitation Shenanigans: You're In, Now What?
- Chris Astacio, Websense - Shining Some Light on the Evolution of Blackhole
- CanSecWest 2013: Julia Wolf @foxgrrl - Analysis of a Windows Kernel Vulnerability: From Espionage to Criminal Use.