11:00 - BeaCon opens; intro
11:30 - TBA
12:00 - TBA
13:00 - TBA
14:00 - TBA
14:15 - TBA
14:30 - TBA
15:30 - TBA
16:30 - TBA
17:30 - TBA
18:00 - Outro; BeaCon ends
Michael Coppola - Performing Open Heart Surgery on a Furby
This talk will dive into the world of hardware hacking, as applied to the satanic toy known only as the Furby. We'll discuss various techniques to reverse engineer and instrument the hardware, including identifying unknown chips, dumping memory, sniffing data buses, and boiling chips in corrosive acid.
Michael Coppola is a vulnerability researcher working at a defense contractor, as well as an undergraduate student at Northeastern University. His main interests include Linux kernel exploitation and rootkit development, embedded systems, and burning things with a soldering iron. He has been known to hack unsuspecting Androids and bathroom scales.
Dan Crowley - Application-level Denial of Service
TBD
Daniel (aka "unicornFurnace") is a Managing Consultant for Trustwave's SpiderLabs team. Daniel denies all allegations regarding unicorn smuggling and questions your character for even suggesting it.
Daniel has developed configurable testbeds such as SQLol and XMLmao for training and research regarding specific vulnerabilities. Daniel enjoys climbing large rocks. Daniel has been working in the information security industry since 2004 and is a frequent speaker at conferences including DEFCON, Shmoocon, and SOURCE. Daniel does his own charcuterie.
Oliver Day - Guerrilla Techniques in Website Defense
> Defending websites has become more difficult as advance tools have proliferated in the underground markets. Organizations that are too small to afford IT staff, let alone security staff, are outgunned and have little chance at keeping attackers out. This talk describes a new strategy in web defense that focuses on cheap and fast recovery of web site attacks. We will discuss automated backup and detection strategies that assume the attacker can and will compromise an account that allows them to write files to the web
Paul Drapeau - Steganography in a Commonly Used HF Protocols
TBD
Andrew Murray - TBD
TBD
Comments (0)
You don't have permission to comment on this page.