19 Jun 2019 #IICSG2019

COMMUNITY NIGHT

ORGANISED BY

SPONSORED BY

In support of the local community, it's #IICSG tradition to host Singapore Cybersecurity Community's mini-conference, organised by the local cybersecurity community group(s).

SCHEDULE

6.45pm — ​7.00pm
COMMUNITY NIGHT WELCOME ADDRESS
Emil Tan & Fadli Sidek, Division Zero (Div0)
7.00pm — ​7.30pm
COMMUNITY NIGHT OPENING ADDRESS
Dhillon 'L33tdawg' Kannabhiran, Hack in the Box (HITB)
7.30pm — 8.15pm
FINDING A BIG SUPPLY CHAIN ATTACK
Vitaly Kamluk, Kaspersky Lab
Supply chain attacks are some of the least expected and hard to discover threats in the modern world. Often relying on valid digital signatures and reputation of the vendors many of security checks and mechanisms are letting malicious code injections through into vast number of victim computers. This year Kaspersky Lab has uncovered multiple cases of such compromises. We would like to share some insights from the investigation and send a message to all the software developers about the threat they need to be concerned of.
Vitaly Kamluk has been involved in malware research at Kaspersky Lab since 2005. In 2008, he was appointed Senior Antivirus Expert, before going on to become Director of the EEMEA Research Center in 2009. He spent a year in Japan focusing on major local threats affecting the region. In 2014 he was seconded to the INTERPOL Global Complex for Innovation in Singapore, where for 2 years he worked in the INTERPOL Digital Crime Center specializing in malware reverse engineering, digital forensics and cybercrime investigation. Today Vitaly is based in Singapore and is heading a team of researchers in APAC that focuses on targeted attacks investigation. Vitaly has presented at many public international security conferences including Blackhat USA, Blackhat Asia, Defcon, HITCON, BSides LasVegas, PHDays, ZeroNights, FIRST, Source Boston, Ruxcon as well as multiple closed-door invite-only security industry events.
8.15pm — ​9.00pm
OLD-SKOOL COPY PROTECTION: DRM IN THE AGE OF MARIO
Aliz Hammond, MWR InfoSecurity
Back in the 1980s and 1990s, computing was very different to how it is today. With most videogames housed in arcade cabinets, or transferred on floppy disks (or even cassette tapes!), controlling access to data was a difficult task.
In this talk, I will talk about some esoteric and interesting ways that copy-protection has been attempted in the past, both successfully and otherwise. I'll talk about the use of lasers to melt floppy disk surfaces, tamper-resistant "suicide batteries", and the rude messages that developers have hidden in their software to dissuade pirates.
Some techniques are still in use to this day and may be relevant to your technical field — but mostly this is intended to sate your curiosity (and provide a history lesson for those that have never used a pen and paper to copy a codewheel so they can run the latest warez).

Infosec in the City. Copyright © 2017-2019
IIC Productions (Pte. Ltd.). All rights reserved.

  • @infoseccity
  • @infosec_city

Contact Us  |  Join Our Mailing List   |  Follow Us :