{"id":224,"date":"2006-06-01T07:49:59","date_gmt":"2006-06-01T07:49:59","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2006\/06\/syscan06-the-asian-hackers-conference\/"},"modified":"2015-09-09T19:43:55","modified_gmt":"2015-09-09T11:43:55","slug":"syscan06-the-asian-hackers-conference","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2006\/06\/syscan06-the-asian-hackers-conference\/","title":{"rendered":"SyScan’06 – The Asian Hackers’ Conference"},"content":{"rendered":"

[ad]<\/p>\n

The Symposium on Security for Asia Network aims to be a very different security conference from the rest of the security conferences that the information security community in Asia has come to be so familiar and frustrated with. SyScan’06 intends to be a non-product, non-vendor biased security conference. It is the aspiration of SyScan’06 to congregate, in Singapore , the best security experts in their various fields, to share their research, discovery and experience with all security enthusiasts in Asia.<\/p>\n

SyScan’06 – The Hackers’ Conference, will be held in Singapore from 20th to 21st July 2006. This is the third year running for SyScan.<\/p>\n

SyScan 06 Day 1 20th July 2006<\/p>\n

8:00 a.m. Registration
\n8:40 a.m. Welcome Speech – Thomas Lim
\n8:45 am Marc Maiffret Chief Hacking Officer, eEye – Keynote Speech
\n9:30 a.m. Paul Craig – Unpacking Malware, Trojans and Worms
\n10:30 a.m. Coffee and Beer Break
\n11:00 a.m. Thorsten Holz – Towards Automated Botnet Detection and Mitigation
\n12:30 a.m. Lunch
\n1:30 a.m. Enrique Sanchez – I-worm.Fuzzer: A New Propagation Type of Virus
\n2:30 p.m. Andrew Griffth – Securing Unix\/Linux Systems
\n3:30 p.m. Hendrik Scholz – VoIP Security Issues: Problems on the users side and what are the providers doing wrong?
\n4:30 p.m. Coffee and Beer Break
\n5:00 p.m. Barnaby Jack – Exploiting Embedded System
\n6:00 p.m. Alexander Sotirov – Reverse Engineering Microsoft Binaries
\n7:00 p.m. End of Day 1<\/p>\n

SyScan 06 Day 2 21st 2006
\n9:00 a.m. Joachim De Zutter – Feedback Fuzzing
\n10:00 a.m. Coffee and Beer Break
\n10:15 a.m. Angelo Rosiello – Writing behind a buffer
\n11:15 a.m. Andre Protas – Skeleton in Microsoft closet
\n12:15 p.m. Lunch
\n1:00 p.m. Nish Bhalla – Binary Analysis, Finding Secret in ISAPIs
\n2:00 p.m. Marek Bialoglowy – Are You Sure Phone Banking Is Safe?
\n3:00 p.m. Coffee and Beer Break
\n3:15 p.m. Fyodor Yarochkin and Meder Kydyraliev – Yet Another Web Application Testing Toolkit
\n4:15 p.m. Alexander Kornbrust – Oracle Rootkits and Oracle Viruses
\n5:15 p.m. Coffee and Beer Break
\n5:30 p.m. Joanna Rutkowska – Subverting Vista Kernel for Fun and Profit
\n6:30 p.m. Closing Speech and Lucky Draw
\n7:00 p.m. End of SyScan 06<\/p>\n

For more information check here:<\/p>\n

<\/p>\n

http:\/\/www.syscan.org\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

[ad] The Symposium on Security for Asia Network aims to be a very different security conference from the rest of the security conferences that the information security community in Asia has come to be so familiar and frustrated with. SyScan’06 intends to be a non-product, non-vendor biased security conference. It is the aspiration of SyScan’06 […]<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[27,1],"tags":[38,37,658,215,657],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Darknet","author_link":"https:\/\/www.darknet.org.uk\/author\/darknet\/"},"_links":{"self":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts\/224"}],"collection":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/comments?post=224"}],"version-history":[{"count":0,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts\/224\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/media?parent=224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/categories?post=224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/tags?post=224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}