| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

BeaConSchedule

This version was saved 10 years ago View current version     Page history
Saved by Zach Lanier
on March 27, 2014 at 12:36:30 pm
 

11:00 - BeaCon opens; intro

11:30 - TBA

12:00 - TBA

13:00 - TBA

14:00 - TBA

14:15 - TBA

14:30 - TBA

15:30 - TBA

16:30 - TBA

17:30 - TBA

18:00 - Outro; BeaCon ends 

 


Michael Coppola - Performing Open Heart Surgery on a Furby 

This talk will dive into the world of hardware hacking, as applied to the satanic toy known only as the Furby.  We'll discuss various techniques to reverse engineer and instrument the hardware, including identifying unknown chips, dumping memory, sniffing data buses, and boiling chips in corrosive acid.

 

Michael Coppola is a vulnerability researcher working at a defense contractor, as well as an undergraduate student at Northeastern University. His main interests include Linux kernel exploitation and rootkit development, embedded systems, and burning things with a soldering iron. He has been known to hack unsuspecting Androids and bathroom scales.

 

Dan Crowley - Application-level Denial of Service

TBD

 

Daniel (aka "unicornFurnace") is a Managing Consultant for Trustwave's SpiderLabs team. Daniel denies all allegations regarding unicorn smuggling and questions your character for even suggesting it.

Daniel has developed configurable testbeds such as SQLol and XMLmao for training and research regarding specific vulnerabilities. Daniel enjoys climbing large rocks. Daniel has been working in the information security industry since 2004 and is a frequent speaker at conferences including DEFCON, Shmoocon, and SOURCE. Daniel does his own charcuterie.

 

Oliver Day - Guerrilla Techniques in Website Defense

> Defending websites has become more difficult as advance tools have proliferated in the underground markets. Organizations that are too small to afford IT staff, let alone security staff, are outgunned and have little chance at keeping attackers out. This talk describes a new strategy in web defense that focuses on cheap and fast recovery of web site attacks. We will discuss automated backup and detection strategies that assume the attacker can and will compromise an account that allows them to write files to the web

 

Paul Drapeau - Steganography in a Commonly Used HF Protocols

TBD

 

Andrew Murray - TBD

TBD   

Comments (0)

You don't have permission to comment on this page.