Tuesday, 27 December 2011

Hacker Halted Asia Pacific Conference 2011 (Updates)

Dr Christine Lee and Ms Chan Jin Zen (from BSc (Hons) Software Engineering, Level 2) attended the Hacker Halted Asia Pacific Conference 2011 on 15 November 2011 at the InterContinental Hotel, Kuala Lumpur.

The Conference Agenda is listed below:

09.00am Opening
09.15am Welcome and Opening Keynote: Defending the Frontier 3.0 | Presenter: Jay Bavisi
10.00am Morning Refreshment
10.30am I built what? - Why The Bad Guys Do It Better | Presenter: Sean Bodmer
Synopsis: For well over a decade cyber-crime has steadily risen at incredible rates across the world. How is this possible with so many law enforcement and security vendors out there trying to solve the problem? Over the past eleven years viruses and trojans have evolved into a never ending deluge of crimeware campaigns. How is this possible? Well let’s talk about that. In this talk you will see first-hand how easy it is for criminals to setup a cyber-crime campaigns including their infrastructure, infection vectors, and building better tools. The goal of any bad guy is to evade detection, remain persistent, and generate revenue. Well let’s talk about all of that and why these criminals become akin to the “The Six Million Dollar Man’ and are very successful @ getting away with their actions.
11.15am Advanced Forensics Analysis - Why Reverse Engineer? | Presenter: Wayne Burke
Synopsis: Understand the need to reverse engineer of the forensics process. Learn advanced methodologies being employed  in the current state of computer forensics. Find out what works and what not. Wayne will be showcasing the latest technologies and methods hackers are employing to cover up their traces, and help you understand why reverse engineering has become an important process in order to unearth hidden tracks.
12.00pm And you will know us by the trail of our logs Malware research and analysis using logs | Presenter: Zachary Wolff
Synopsis: In this talk we will take a proactive approach to malware research and analysis by looking at specific samples and the log trails they leave behind.  In certain cases the exploits that malware utilize will  generate an identifiable log trail, in others it will be the malware’s unique behavioral logs that clues us in .  We will examine some of the more relevant log sources to be looking at and also some ways to proactively capture relevant logs.
12.45pm Lunch Break
01.45pm Web Shellz: SQL Injection, and Cross-Site Scripting is Boring – Gimme a command prompt | Presenter: Joe McCray
Synopsis: Web shellz are game changers. This presentation will show you how hackers can use vulnerabilities like SQL Injection, Cross-Site Scripting, and File Handling vulnerabilities to obtain command-line access to your critical servers and clients.
02.30pm Transparent Botnet Command And Control for Smartphones Over Sms | Presenter: Georgia Weidman
Synopsis: As smartphones become increasingly ubiquitous and powerful, they become appealing targets for botnet infections. Many of the top selling smartphone platforms are built on common PC operating systems. This makes the transition from developing PC based malware to smartphone based malware nearly trivial. Smartphone malware and specifically botnets have been seen both in security research and in the wild. The GSM modem can be viewed as a public IP address without filtering or firewall capabilities. The presentation shows an example of a smartphone botnet that is controlled over the GSM function SMS. The presented system works at the base operating system below the application layer, resulting in transparency to the user. Details of the system are discussed with particular interest on cryptography and security concerns. A live demonstration of bots with cryptography will be shown as well as a new code release.
03.15pm Taking On Advanced Persistent Threats | Presenter: Kevin Cardwell
Synopsis: One of the many definitions of Advanced Persistent Threat (APT) is the continuous wave of sophisticated and organized cyber attack to access and steal information from compromised computers. So how do we depend against APT? Attacks used by the APT intruders are not very different from any other intruder. Sometimes, attack is the best form of defense. This session will have Kevin teach the audience how to adopt an offensive mindset to provide a robust and solid defense. He will teach you how to develop a secure baseline and “harden” your enterprise architectures from the most advanced attacks.
04.00pm Afternoon Refreshment
04.30pm Panel Discussion
05.15pm Secrets to Hacking: The Challenges, Risks and Rewards | Presenter: Haja Mohideen
06.00pm Closing Keynote: 9/11: 10 Years Later (How Crisis Intervention and Planning Affect Secure Infrastructures) | Presenter: Drew Williams
06.30pm Break (Dinner is not included)
07.30pm Night Hack Live
10.00pm End


Jin Zen and Dr Lee

Speakers at the Panel Discussion

No comments:

Post a Comment