First set of speakers for #HITB2012AMS includes iOS 'Jailbreak Dream Team' and more
The first set of accepted presentations and speakers for the upcoming HITB Security Conference in Amsterdam has been announced including lots of goodies for Apple fans with the iOS jailbreak 'Dream Team' set to make an appearance in not one but two 60 minute sessions covering the inner workings behind the Corona and Absinthe jailbreaks! If that wasn't enough, the legenday MuscleNerd of the iPhone Dev Team will also be presenting a look behind the scenes of the iPhone baseband.
In addition to the previously announced keynotes by Andy Ellis (Chief Security Officer of Akamai) and crypto expert, Bruce Schneier, the following speakers have been confirmed, with more to be announced on the 20th of March.
- ADAM GOWDIAK (Founder/CEO, Security Explorations)
- ALEX BAZHANYUK (Reverse Engineer, CISS)
- ANDREI COSTIN (Author, MiFare Classic Universal Toolkit)
- CHEMA ALONSO (Security Consultant, Informatica64)
- CYRIL / @pod2g (Member, Chronic-Dev Team)
- DAVID WANG / @planetbeing (Member, iPhone Dev Team)
- DIDIER STEVENS (Security Consultant, Contraste Europe NV)
- GAL DISKIN (Senior Security Researcher, Intel Corp)
- GEORGIA WEIDMAN (Founder, Bulb Security LLC)
- ITZHAK ‘ZUK’ AVRAHAM (Founder, zimperium)
- JOSHUA HILL / @p0sixninja (Team Lead, Chronic-Dev Team)
- MUSCLENERD (Member, iPhone Dev Team)
- NIKIAS BASSEN / @pimskeks (Member, Chronic-Dev Team)
- NIKITA TARAKANOV (Reverse Engineer, CISS)
- NIR GOLDSHLAGER (Senior Researcher, zimperium)
- ROBERTO SUGGI LIVERANI (Principal Security Consultant, Security-Assessment.com)
- SCOTT BELL (Principal Security Consultant, Security-Assessment.com)
A special presentation by Dutch Journalist of the Year 2011, Brenno de Winter is also planned for the end of conference day 1 (24th May). So what other topics have been lined up? Take a look at the list below:
Security Threats in the World of Digital Satellite Television
Killing a Bug Bounty Program – TWICE
Security Vulnerabilities of Digital Video Broadcast Chipsets
Window Shopping: Browser Bug Hunting in 2012
Automatically Searching for Vulnerabilities: How to Use Taint Analysis to Find Security Bugs
PostScript – Danger Ahead – Hacking MFPs, PCs and Beyond
The Power of FOCA 3: Why You’ll Love The Seals
White Hat Shellcode: Not for Exploits
Hacking using Dynamic Binary Instrumentation
Bypassing the Android Permission Model
There are limited seats for the quad track conference on the 24th and 25th of May, and it is highly recommended you register early (i.e. NOW if you haven't already)! For the latest updates and announcements, feel free to follow @hitbsecconf on Twitter - The hash tag for the conference is #HITB2012AMS