CanSecWest 2014

 

CanSecWest 2014 Files

Fighting Next-Generation Adversaries with Shared Threat Intelligence
Jacob West ; CTO - Enterprise Security Products, HP 

USB Flash Storage Threats and Threat Mitigation in an Air-Gapped Network Environment
George Pajari ; HCIS

No Apology Required: Deconstructing Blackberry 10
Zach Lanier, Ben Nell ; Duo Security & Accuvant

Revisiting iOS Kernel (In)Security
Tarjei Mandt ; Azimuth Security

The Real Deal of Android Device Security: the Third Party
Collin Mulliner, Jon Oberheide ; Northeastern University, Duo Security

Exploring RADIUS
Brad Antoniewicz ; Foundstone/McAfee/Intel

Copernicus 2, SENTER the Dragon
Xeno Kovah, John Butterworth ; MITRE

All Your Boot Are Belong To Us
Corey Kallenberg, Yuriy Bulygin ; Intel, MITRE (Intel Slides) - (MITRE Slides)

Platform Firmware Security Assessment with CHIPSEC
John Loucaides, Yuriy Bulygin ; Intel

Less is more, Exploring code/process-less techniques and other weird-machine methods to hide code (and how to detect them)
Shane Macaulay ; IOActive / Security Objectives

ROPs are for the 99%: A revolutionary bypass technology
Yang Yu a.k.a. "tombkeeper"; NSFOCUS Labs

Concurrency: a problem and opportunity in the exploitation of memory corruptions
Ralf-Philipp Weinmann; Comsecuris

Utilizing machine learning and DNS traffic to discover malware infections and C&C traffic
Brandon Niemczyk, Josiah Hagen, Jonathan Andersson

Exploit Detection
Haifei Li & Chong Xu ; McAfee a.k.a. Intel Security

Combating the Advanced Memory Exploitation Techniques: Detecting ROP with Memory Information Leak
Stanley Zhu and Chong Xu ; McAfee/Intel Security

Intelligent Use of Intelligence: Design to Discover
Ping Yan and Thibault Reuille ; OpenDNS

The Art of Leaks: The Return of Heap Feng Shui
Tao Yan a.k.a. "ga1ois" ; NSFOCUS Labs

Outsmarting Bluetooth Smart
Mike Ryan ; iSEC Partners