[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CA+SRR9XK4rzXVnemaQ-2BuK72QAiETDMAqj4e-oWPjMvK_2ofQ@mail.gmail.com>
Date: Fri, 20 Sep 2013 09:23:02 +0200
From: Fab Duchene <f.duchene@...hack.org>
To: full-disclosure@...ts.grok.org.uk
Subject: GreHack 2013 - 15 Nov. Grenoble,
France - Conf. Registration OPEN
====================================================================
GREHACK 2013 - 2nd International Symposium in Grey-Hat Hacking
2nd Edition - p*wn me i'm famous!
http://grehack.org
https://twitter.com/grehack
Grenoble, France
November 15, 2013
====================================================================
> Program
> Registration Ticket,
> Call For Music Bands/Artists/DJ
> CTF
====================================================================
PROGRAM: INVITED SPEAKERS
--
* Herbert Bos (Vrije Universiteit Amsterdam, Netherlands) - Tain't not
enough time to fuzz all the memory errors
* Halvar Flake (Zynamics-Google, Zurich) - TBA
* TBA
http://grehack.org/en/2013/index.php/Speakers_Talks/#Invited_Speakers
====================================================================
PROGRAM: ACCEPTED PAPERS
--
* Markku-Juhani Olavi Saarinen (NTU, Singapore) - Developing a Grey
Hat C2 and RAT for APT Security Training and Assessment
* Mathieu Cunche (INRIA) - I know your MAC Address: Targeted tracking
of individual using Wi-Fi
* Ludovic & Axelle Apvrille (Telecom Paris & Fortinet) - Pre-filtering
Mobile Malware with Heuristic Techniques
* Josselin Feist, Laurent Mounier and Marie-Laure Potet (VERIMAG) -
Statically Detecting Use After Free on Binary Code
* Alejandro Nolla (Spain) - Amplification DDoS attacks with game servers
* Eireann Leverett and Reid Wightman (IOActive, US) - Vulnerability
Inheritance in Programmable Logic Controllers
* Jagdish Achara, James-Douglas Lefruit, Vincent Roca and Claude
Castelluccia (INRIA Privatics) - Detecting Privacy Leaks in the RATP
App: how we proceeded and what we found
* Ruo Ando, Yuuki Takano, Satoshi Uda (NICT, Japan) - Unraveling large
scale geographical distribution of vulnerable DNS servers using
asynchronous I/O mechanism
* Francois Desplanques and Guillaume Jeanne (Ensimag) - Attacks using
malicious devices: a way to protect yourself against physical access
http://grehack.org/en/2013/index.php/Speakers_Talks/#Accepted_Papers_.26_Talks
====================================================================
REGISTRATION: ENTRY TICKETS
--
Limited number of seats available.
Register at:
http://grehack.org/en/shop/article/entrance_tickets/grehack_2013/
====================================================================
CALL FOR DJ/ARTISTS/BANDS FOR THE CTF
--
http://grehack.org/en/2013/index.php/Capture_The_Flag_rules-english/#Ambient
====================================================================
CTF - CAPTURE THE FLAG
--
* Challenges categories:
-- Cryptography, Exploit, Forensic, Misc, Network,
Reverse-engineering, Steganography and Web
* Awards:
-- HP Slate 7, Raspberry Pi.
* pizzas + drinks included :)
http://grehack.org/en/2013/index.php/Capture_The_Flag_rules-english/
--
Come on, Let's p0wn in da mountains!
--
http://grehack.org
https://twitter.com/#grehack
https://twitter.com/grehack
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists