Dr. Krishnan is head (Embedded Security) and Strategic Thrust Leader (Mobile Security) in the Department of Infocomm Security, Singapore. Dr. Krishnan has 15 years of industry experience and has worked on computer security (mobile security, DNS security, network security, and OS security), data mining, high performance computing and embedded systems.
His presentation will describe in detail about the STAMP system and its salient features. STAMP is a system that has been built to discover unknown vulnerabilities in mobile platforms. STAMP comprises of an arsenal of 6 tools and is robust & scalable by design. STAMP uses negative testing for this process and show that it takes much more than using any tool from the internet for this task. STAMP is not yet-another negative testing tool but a framework/harness which can use your favorite negative testing tool.
Mohit Kumar is the Founder of 'The Hacker News', which is an Internationally recognized as a leading news source dedicated to promoting awareness for security experts and hackers and Co-Founder of 'The Hackers Conference'. Mohit is uniquely qualified with his ability to bridge the knowledge and common platform gap between the Underground Hackers, Security Researcher and law enforcement.
Mayank is working as a Smartphone application developer in Samsung R&D department and He has just returned from South Korea after 6 month of research at Samsung headquarters. He has several years of experience in R&D on Android Platform.
This year at 'The Hackers Conference' They will demonstrate amazing Surveillance backdoor features in many popular Android applications. We use Android devices for more stuff than we do on a normal cell phone like accessing our Emails, bank accounts, sharing personal pictures, call records, Contacts, SMS etc. How safe are they? They sheds some light!
Ali Pabrai is the CEO of ecfirst and member of the U.S. InfraGard (FBI). A highly sought after information security and regulatory compliance expert, he has successfully delivered solutions on compliance and information security to organizations worldwide. A secretive Chinese military People's Liberation Army's Shanghai-based Unit 61398 is believed to be behind a series of hacking attacks on the Government as well as aerospace, communications and energy companies.
At 'The Hackers Conference 2013', his talk will cover the recent cyber attacks on several industries, including banking, finance, healthcare as well as Government agencies by Chinese Hackers. He will demonstrate step by step how these attacks were launched on networks without detection or discovery and how they hack into the computer networks that control oil pipelines, power grids, water plants and other pieces of key state infrastructure.
Angelo Prado is a Lead Product Security Engineer at Salesforce.com. He has worked as a software and security engineer for Microsoft and Motorola. Angelo has been involved with the security community for over 8 years. His passions & research include web application security, windows security, browsers, malware analysis and Spanish Jamón.
Yoel Gluck is a security researcher with 12 years of experience in the industry. He is currently a Lead Product Security Engineer at Salesforce.com. His research areas include web application, network, virtualization, encryption, and email security.
Neal Harris is working with SQUARE, INC. - While studying pure math in school, He dipped his toes into the world of security by spending summers doing cryptanalysis. After stumbling through a PhD at UC San Diego, He left academia to pursue a full-time career breaking things, and helping developers make things that are harder to break.
In this hands-on talk, They will introduce new targeted techniques and research that allows a skilled attacker to reliably retrieve encrypted secrets (session identifiers, CSRF tokens, OAuth tokens, email addresses, ViewState hidden fields, PII…) from an arbitrary HTTPS channel. We will demonstrate this browser vector is real and practical by executing a real PoC against a major enterprise product – Under 30 seconds. The BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) attack is an offshoot of CRIME, which was thought dead and buried after it was disclosed in September
Jiten is a Mobile warfare researcher. His areas of interest are Location based Services and Chinese cyber fare and Mobile Security Research.
Abhay is a Mobile Application specialist with several years of experience is designing Mobile applications and Designing M-commerce platforms.
At The Hackers Conference, This session will introduce you to WeChat Forensics and reveal some weak security implementations in the application. WeChat is a rich media data messaging app by Tencent, a Chinese Internet Giant and has millions of users in India. They will showcase, how WeChat is a threat to the National Security, as it effectively gives the Chinese government not just access to our chat logs, but also to each and every data on our Smart Phones.
Bitcoins have been called a "crypto-currency," the online equivalent of a brown paper bag of cash. Bitcoins are a peer-to-peer currency, not issued by banks or governments, but created and regulated by a network of other bitcoin holders' computers. Bitcoin is the future of the payment system of the digital world. After the seizure of the one of the most famous payment processor "Liberty Reserve", everyone is thinking what could be the next option for underground cyber criminals - On the top of the list is "BITCOIN".
Aman's presentation at 'The Hackers Conference' will focus on what is Bitcoin and how it works. Talk will include working of Bitcoin system, Bitcoin mining process and how cyber criminals are generating Bitcoins illegally using Botnet malwares to earn million $$$$$ from home. Even more interestingly, Aman will talk that how cybercriminals are using Bitcoins to carry out their untraceable transactions in Underground Market & executing Financial frauds and malicious activities.
Parth Shukla is an Information Security Analyst in the Co-ordination Centre at the Australian Computer Emergency Response Team (AusCERT). He works in the CC Team providing analysis, monitoring threats and responding to member requests for incident handling. Parth has an extensive experience of working in the IT field over the past 8 years. While at AusCERT, Parth has been analyzing the data of the Carna Botnet and now he is the only one in the world who has access to the complete data set related to Carna Botnet.
His presentation will showcase the latest analysis and the progress of industry collaboration on the problem of internet facing devices that have default credential logins through telnet. The Carna Botnet, which was used to perform the Internet Census 2012, highlighted a major information security concern with devices that allow default credential login from the internet by default. The aim of the presentation is to continue to bring public awareness of the larger issue as well as make it possible for information security professionals in India and around the world to be aware of the progress of his mission of reducing/removing the vulnerable devices.
Aditya Gupta handles the security at Rediff. His main role is to take care of Web Application Security, develop tools, automate stuffs and block spam. He also has done a lot of bug bounties and is there in numerous hall of fames including Google, Apple, Facebook, Microsoft etc. He has also given talks and trainings at variety of national and international conferences such as Blackhat, Toorcon, OWASP AppSec, Syscan, Nullcon, ClubHACK etc.
Subho Halder is a Programmer, Security Researcher and Penetration Tester working in TCS. Both are the creator of Android Framework for Exploitation and having a deep understanding of Android and Blackberry frameworks.
This talk will be focused on the new techniques of Android Exploitation, and how the Android malware authors have been developing more advanced malwares. We will also be showing how malware authors create fake legitimate applications, and how to detect those kind of infections. We would be showing full fledged botnets, which could be operated over HTTP and SMS, and how anti-malwares fail to detect those by crypting the malware using AFE. We would be concluding with finding vulnerabilities in Android applications using AFE, and writing exploits for some famous Android apps available in Google Play.
Note: More Speakers will be announced shortly in few days. For more info Contact Us