Keynote Speakers 2013

H.E. Shri. Prasad Kariyawasam
(High Commissioner of Sri Lanka to India) Shri. Prasad Kariyawasam is High Commissioner of Sri Lanka to India since December 2009, joined the Sri Lanka Foreign Service in 1981 and has held diplomatic assignments in Geneva, Riyadh, Washington, New Delhi and New York. In his last posting in New Delhi he served as Deputy High Commissioner for Sri Lanka in India, holding the rank of an Ambassador. He has also served as the Chairperson of the United Nations Special Committee to Investigate Israel Practices Affecting the Human Rights of the Palestine People and Other Arabs of the Occupied Territories from 2005 to 2008.
Shri. K.C. Singh
(Former Secretary, Ministry of External Affairs)
Shri. K.C. Singh served as Ambassador to the United Arab Emirates and Iran. He retired as Secretary in the Ministry of External Affairs. He also served as Deputy Secretary to the President of India. He held several senior positions at headquarters including that of Joint Secretary for administration, head of the Consular, Passport and Visa Division and as Spokesman of the Ministry. He is currently a columnist, strategic analyst and a Distinguished Fellow at the Institute of Peace and Conflict Studies. He has extensively spoken on U.S. snooping using ‘PRISM’ program on Indian Citizens and Institutions.
Shri. Dinesh O. Bareja
(CISA, CISM, ITIL, BS: 7799 (Imp & LA), Cert IPR Principal and CEO at Open Security Alliance)
Mr. Dinesh has been in IT Security from nearly 10 years. Presently Mr. Dinesh is working in Enterprise and with a State Government in areas of Security Strategy, Planning and Oversight. He is alos the Advisor with Cyber Defence Research Centre, Jharkhand Police & State IT Department. Mr. Dinesh is Co-founder of the Indian Honeynet Project. He is a the member of ISACA, India-InfoSec Yahoo Group, DSCI, National Anti-Hacking Group, ACFE, PRIMA, OWASP, NULL, Information Sharing & Research Association (ISRA), ClubHack.
Shri. Virag Gupta
(Supreme Court Advocate)
Mr. Virag Gupta is a well known Supreme Court Lawyer. He is handling most challenging cases of Cyber laws. He is a former Civil Servant with versatile experience of all the sectors of economy and presently managing partner of New Delhi based Law Firm RTI Legal. He filed the first petition before Supreme Court of India against the US Snooping of internet data and insisted for checks on internet companies to safeguard the privacy of internet users. He has written numbers of articles on variety of cyber issues.
Technical Speakers 2013

Title : STAMP - Security Testing Arsenal for Mobile Platforms
Speaker : Dr. S. P. T. Krishnan, Scientist, Strategic Thrust Leader (Mobile Security) - Institute for Infocomm Research, Singapore

Dr. Krishnan is head (Embedded Security) and Strategic Thrust Leader (Mobile Security) in the Department of Infocomm Security, Singapore. Dr. Krishnan has 15 years of industry experience and has worked on computer security (mobile security, DNS security, network security, and OS security), data mining, high performance computing and embedded systems.

His presentation will describe in detail about the STAMP system and its salient features. STAMP is a system that has been built to discover unknown vulnerabilities in mobile platforms. STAMP comprises of an arsenal of 6 tools and is robust & scalable by design. STAMP uses negative testing for this process and show that it takes much more than using any tool from the internet for this task. STAMP is not yet-another negative testing tool but a framework/harness which can use your favorite negative testing tool.

Title : Droid Surveillance - backdoors in Popular Android applications
Speaker : Mohit Kumar (Unix_Root), Malware Developer and Cyber Security, Researcher - Founder 'The Hacker News'.
Speaker : Mayank Raj Jaiswal ( Mack ) - Smartphone software developer and Hacker

Mohit Kumar is the Founder of 'The Hacker News', which is an Internationally recognized as a leading news source dedicated to promoting awareness for security experts and hackers and Co-Founder of 'The Hackers Conference'. Mohit is uniquely qualified with his ability to bridge the knowledge and common platform gap between the Underground Hackers, Security Researcher and law enforcement.

Mayank is working as a Smartphone application developer in Samsung R&D department and He has just returned from South Korea after 6 month of research at Samsung headquarters. He has several years of experience in R&D on Android Platform.

This year at 'The Hackers Conference' They will demonstrate amazing Surveillance backdoor features in many popular Android applications. We use Android devices for more stuff than we do on a normal cell phone like accessing our Emails, bank accounts, sharing personal pictures, call records, Contacts, SMS etc. How safe are they? They sheds some light!

Title : Unit 61398 Cyber Attacks from Shanghai: Prepared?
Speaker : Ali Pabrai, CEO ecfirst, MSEE, CISSP (ISSAP, ISSMP) Security+ Certified and member of the U.S. InfraGard (FBI)

Ali Pabrai is the CEO of ecfirst and member of the U.S. InfraGard (FBI). A highly sought after information security and regulatory compliance expert, he has successfully delivered solutions on compliance and information security to organizations worldwide. A secretive Chinese military People's Liberation Army's Shanghai-based Unit 61398 is believed to be behind a series of hacking attacks on the Government as well as aerospace, communications and energy companies.

At 'The Hackers Conference 2013', his talk will cover the recent cyber attacks on several industries, including banking, finance, healthcare as well as Government agencies by Chinese Hackers. He will demonstrate step by step how these attacks were launched on networks without detection or discovery and how they hack into the computer networks that control oil pipelines, power grids, water plants and other pieces of key state infrastructure.

Title : BREACH: SSL, gone in 30 seconds
Speaker : Angelo Prado , Lead Product Security Engineer at
Speaker : Yoel Gluck, Security researcher and Lead Product Security Engineer at
Speaker : Neal Harris, Security researcher - SQUARE, INC.

Angelo Prado is a Lead Product Security Engineer at He has worked as a software and security engineer for Microsoft and Motorola. Angelo has been involved with the security community for over 8 years. His passions & research include web application security, windows security, browsers, malware analysis and Spanish Jamón.

Yoel Gluck is a security researcher with 12 years of experience in the industry. He is currently a Lead Product Security Engineer at His research areas include web application, network, virtualization, encryption, and email security.

Neal Harris is working with SQUARE, INC. - While studying pure math in school, He dipped his toes into the world of security by spending summers doing cryptanalysis. After stumbling through a PhD at UC San Diego, He left academia to pursue a full-time career breaking things, and helping developers make things that are harder to break.

In this hands-on talk, They will introduce new targeted techniques and research that allows a skilled attacker to reliably retrieve encrypted secrets (session identifiers, CSRF tokens, OAuth tokens, email addresses, ViewState hidden fields, PII…) from an arbitrary HTTPS channel. We will demonstrate this browser vector is real and practical by executing a real PoC against a major enterprise product – Under 30 seconds. The BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) attack is an offshoot of CRIME, which was thought dead and buried after it was disclosed in September

Title : WeChat Forensics – A Wake up Call on National Security
Speaker : Jiten Jain , Cyber Security Analyst and Mobile Warfare Researcher
Speaker : Abhay Agarwal , Mobile Application Specialist , India

Jiten is a Mobile warfare researcher. His areas of interest are Location based Services and Chinese cyber fare and Mobile Security Research.

Abhay is a Mobile Application specialist with several years of experience is designing Mobile applications and Designing M-commerce platforms.

At The Hackers Conference, This session will introduce you to WeChat Forensics and reveal some weak security implementations in the application. WeChat is a rich media data messaging app by Tencent, a Chinese Internet Giant and has millions of users in India. They will showcase, how WeChat is a threat to the National Security, as it effectively gives the Chinese government not just access to our chat logs, but also to each and every data on our Smart Phones.

Title : Bitcoins, Bad Guys and The Black Market
Speaker : Aman Srivastava, Hacker and Researcher with focus on Underground Market Techniques & Financial crimes

Bitcoins have been called a "crypto-currency," the online equivalent of a brown paper bag of cash. Bitcoins are a peer-to-peer currency, not issued by banks or governments, but created and regulated by a network of other bitcoin holders' computers. Bitcoin is the future of the payment system of the digital world. After the seizure of the one of the most famous payment processor "Liberty Reserve", everyone is thinking what could be the next option for underground cyber criminals - On the top of the list is "BITCOIN".

Aman's presentation at 'The Hackers Conference' will focus on what is Bitcoin and how it works. Talk will include working of Bitcoin system, Bitcoin mining process and how cyber criminals are generating Bitcoins illegally using Botnet malwares to earn million $$$$$ from home. Even more interestingly, Aman will talk that how cybercriminals are using Bitcoins to carry out their untraceable transactions in Underground Market & executing Financial frauds and malicious activities.

Title : India in the Carna Botnet: Cyber threat to a growing Economy
Speaker : Parth Shukla, Information Security Analyst, AusCERT (Australian Computer Emergency Response Team), Australia

Parth Shukla is an Information Security Analyst in the Co-ordination Centre at the Australian Computer Emergency Response Team (AusCERT). He works in the CC Team providing analysis, monitoring threats and responding to member requests for incident handling. Parth has an extensive experience of working in the IT field over the past 8 years. While at AusCERT, Parth has been analyzing the data of the Carna Botnet and now he is the only one in the world who has access to the complete data set related to Carna Botnet.

His presentation will showcase the latest analysis and the progress of industry collaboration on the problem of internet facing devices that have default credential logins through telnet. The Carna Botnet, which was used to perform the Internet Census 2012, highlighted a major information security concern with devices that allow default credential login from the internet by default. The aim of the presentation is to continue to bring public awareness of the larger issue as well as make it possible for information security professionals in India and around the world to be aware of the progress of his mission of reducing/removing the vulnerable devices.

Title : Developing advanced malwares using Andorid Framework for Exploitation [AFE]
Speaker : Aditya Gupta - Mobile security expert, and Security Researcher,
Speaker : Subho Halder - Mobile Security Researcher, Co-Founder XYSec, TATA Consultancy Services

Aditya Gupta handles the security at Rediff. His main role is to take care of Web Application Security, develop tools, automate stuffs and block spam. He also has done a lot of bug bounties and is there in numerous hall of fames including Google, Apple, Facebook, Microsoft etc. He has also given talks and trainings at variety of national and international conferences such as Blackhat, Toorcon, OWASP AppSec, Syscan, Nullcon, ClubHACK etc.

Subho Halder is a Programmer, Security Researcher and Penetration Tester working in TCS. Both are the creator of Android Framework for Exploitation and having a deep understanding of Android and Blackberry frameworks.

This talk will be focused on the new techniques of Android Exploitation, and how the Android malware authors have been developing more advanced malwares. We will also be showing how malware authors create fake legitimate applications, and how to detect those kind of infections. We would be showing full fledged botnets, which could be operated over HTTP and SMS, and how anti-malwares fail to detect those by crypting the malware using AFE. We would be concluding with finding vulnerabilities in Android applications using AFE, and writing exploits for some famous Android apps available in Google Play.

Note: More Speakers will be announced shortly in few days. For more info Contact Us