Modèle:GreHack2013-conf accepted talks pics content : Différence entre versions

De Ensiwiki
Aller à : navigation, rechercher
(Accepted Papers & Talks)
(Accepted Papers & Talks)
Ligne 38 : Ligne 38 :
 
| [[Image:Grehack-2012-speakers-missing_picture.png|90px|link=GreHack-2013-Speakers_Talks#Josselin_Feist]]
 
| [[Image:Grehack-2012-speakers-missing_picture.png|90px|link=GreHack-2013-Speakers_Talks#Josselin_Feist]]
 
| [[GreHack-2013-Speakers_Talks#Josselin_Feist|Josselin Feist]]
 
| [[GreHack-2013-Speakers_Talks#Josselin_Feist|Josselin Feist]]
| [http://www-verimag.imag.fr VERIMAG]
+
| rowspan="3" | [http://www-verimag.imag.fr VERIMAG]
| [[GreHack-2013-Speakers_Talks#Statically_Detecting_Use_After_Free_on_Binary_Code|'''Statically Detecting Use After Free on Binary Code''' (summary)]]
+
| rowspan="3" | [[GreHack-2013-Speakers_Talks#Statically_Detecting_Use_After_Free_on_Binary_Code|'''Statically Detecting Use After Free on Binary Code''' (summary)]]
 +
|-
 +
| [[Image:Grehack-2012-speakers-missing_picture.png|90px|link=GreHack-2013-Speakers_Talks#Laurent_Mounier]]
 +
| [[GreHack-2013-Speakers_Talks#Laurent_Mounier|Laurent Mounier]]
 +
|-
 +
| [[Image:Grehack-2013-speakers-marie-laure_potet.png|90px|link=GreHack-2013-Speakers_Talks#Marie-Laure_Potet]]
 +
| [[GreHack-2013-Speakers_Talks#Marie-Laure_Potet|Marie-Laure Potet]]
 
|-  
 
|-  
 
| colspan="4" |
 
| colspan="4" |
Ligne 57 : Ligne 63 :
 
| rowspan="2" | [[GreHack-2013-Speakers_Talks#Vulnerability_Inheritance_in_Programmable_Logic_Controllers|'''Vulnerability Inheritance in Programmable Logic Controllers''' (summary)]]
 
| rowspan="2" | [[GreHack-2013-Speakers_Talks#Vulnerability_Inheritance_in_Programmable_Logic_Controllers|'''Vulnerability Inheritance in Programmable Logic Controllers''' (summary)]]
 
|-
 
|-
| [[Image:Grehack-2012-speakers-missing_picture.png|90px|link=GreHack-2013-Speakers_Talks#Reid_Wightman]]
+
| [[Image:Grehack-2013-speakers-reid_wightman.png|90px|link=GreHack-2013-Speakers_Talks#Reid_Wightman]]
 
| [[GreHack-2013-Speakers_Talks#Reid_Wightman|Reid Wightman]]
 
| [[GreHack-2013-Speakers_Talks#Reid_Wightman|Reid Wightman]]
 
|-  
 
|-  
Ligne 80 : Ligne 86 :
 
----
 
----
 
|-
 
|-
| [[Image:Grehack-2012-speakers-missing_picture.png|90px|link=GreHack-2013-Speakers_Talks#Ruo_Ando]]
+
| [[Image:Grehack-2013-speakers-ruo_ando.png|90px|link=GreHack-2013-Speakers_Talks#Ruo_Ando]]
 
| [[GreHack-2013-Speakers_Talks#Ruo_Ando|Ruo Ando]]
 
| [[GreHack-2013-Speakers_Talks#Ruo_Ando|Ruo Ando]]
 
| rowspan="3" | [http://www.nict.go.jp/en/ NICT, Japan]
 
| rowspan="3" | [http://www.nict.go.jp/en/ NICT, Japan]

Version du 6 septembre 2013 à 19:20

Accepted Papers & Talks

Pic Author(s) Corp/Lab/Gov/Self Paper + Talk
Grehack-2012-speakers-missing picture.png Markku-Juhani Olavi Saarinen NTU, Singapore Developing a Grey Hat C2 and RAT for APT Security Training and Assessment (summary)

Grehack-2013-speakers-mathieu cunche.png Mathieu Cunche INRIA I know your MAC Address: Targeted tracking of individual using Wi-Fi (summary)

Grehack-2013-speakers-ludovic apvrille.png Ludovic Apvrille Telecom Paris Pre-filtering Mobile Malware with Heuristic Techniques (summary)
Grehack-2013-speakers-axelle apvrille.png Axelle Apvrille FORTINET

Grehack-2012-speakers-missing picture.png Josselin Feist VERIMAG Statically Detecting Use After Free on Binary Code (summary)
Grehack-2012-speakers-missing picture.png Laurent Mounier
Grehack-2013-speakers-marie-laure potet.png Marie-Laure Potet

Grehack-2013-speakers-alejandro nolla.png Alejandro Nolla Amplification DDoS attacks with game servers (summary)

Grehack-2013-speakers-eireann leverett.png Eireann Leverett IOActive, US Vulnerability Inheritance in Programmable Logic Controllers (summary)
Grehack-2013-speakers-reid wightman.png Reid Wightman

Grehack-2013-speakers-jagdish achara.jpg Jagdish Achara Inria Privatics Detecting Privacy Leaks in the RATP App: how we proceeded and what we found (summary)
Grehack-2012-speakers-missing picture.png James-Douglas Lefruit
Grehack-2012-speakers-missing picture.png Vincent Roca
Grehack-2013-speakers-claude castelluccia.png Claude Castelluccia

Grehack-2013-speakers-ruo ando.png Ruo Ando NICT, Japan Unraveling large scale geographical distribution of vulnerable DNS servers using asynchronous I/O mechanism (summary)
Grehack-2012-speakers-missing picture.png Yuuki Takano
Grehack-2013-speakers-satoshi uda.png Satoshi Uda

Grehack-2012-speakers-missing picture.png François Desplanques Ensimag Attacks using malicious devices: a way to protect yourself against physical access (summary)
Grehack-2012-speakers-missing picture.png Guillaume Jeanne