Error!
You must log in to access this page.
We can't find the internet
Attempting to reconnect
Verbindung zu esel.at
Bringing together the world’s most renowned security professionals from academics, government, industry, and the underground hacking community.
The DeepSec IDSC is an annual European two-day in-depth conference on computer, network, and application security. DeepSec IDSC 2009 will be held from November 17nd to 20th 2009 at the Imperial Riding School Vienna, and aims to bring together the leading security experts from all over the world in Europe.
DeepSec IDSC is a non-product, non-vendor-biased conference event. Our aim is to present the best research and experience from the fields’ leading experts.
Day 1 - Nov 19
08:00
Registration Opens
09:00 - 09:10
Welcome & Introduction
DeepSec Organisation Team (DeepSec.net)
09:10 - 10:00
Technology won’t save you, only people will
Matt Watchinski (Sourcefire Inc.)
10:00 - 10:50
Top 10 Security Issues Developers Don’t Know About
Neelay S. Shah (Foundstone Inc., A Division of McAfee)
USB Device Drivers: A Stepping Stone into your Kernel
Moritz Jodeit, Martin Johns (n.runs AG, University of Passau)
10:50 - 11:10
Coffee Break
11:10 - 12:00
Breaking TOR Sessions with HTML5
Marco Bonetti (CutAway Srl)
Ownage 2.0
Saumil Udayan Shah (Net-Square)
12:00 - 12:50
A Proof-of-Concept Attack on SmartCard-secured Online-Banking
Felix Gröbert and Christoph Wegener (Chair for Network and Data Security, Ruhr-University Bochum)
Dynamic Binary Instrumentation for Deobfuscation and Unpacking
Daniel Reynaud and Jean-Yves Marion (Nancy University - Loria)
12:50 - 14:00
Lunch
14:00 - 14:50
Cloud Services - still too cloudy for take off?
Kurt Kammerer (regify AG)
Key Management Death Match? Competing KM Standards Technical Deep Dive
Marc Massar (Semtek)
14:50 - 15:40
Get your head out of the clouds: security in Software-plus-Services
John Walton (Microsoft)
Windows Secure Kernel Development
Fermin J. Serna (Microsoft)
15:40 - 16:00
Coffee Break
16:00 - 16:50
Results of a security assessment of the TCP and IP protocols and common implementation strategies
Fernando Gont (UK CPNI (Centre for the Protection Of National Infrastructure))
eKimono: detecting rootkits inside Virtual Machine
Nguyen Anh Quynh (AIST)
16:50 - 17:40
The Kingdom of the Blind: OSX Incident Response
Morgan Marquis-Boire (Google) Stoned déjà vu - again
Peter Kleissner (Independent Researcher)
17:40 - 18:40
Night Talk: The Threat Landscape: The Reality vs. The Hype
Toralv Dirro (Avert Labs EMEA, McAfee) #TwitterRisks: Bot C&C, Data Loss, Intel Collection & More
Ben Feinstein (SecureWorks)
20:00 - 23:59
Speaker’s Dinner
