📜 ⬆️ ⬇️

In the wake of RusKrypto'2010

Last weekend, the RusCrypto'2010 conference took place. Each year, it gathers leading experts in the field of information security. The conference has long expanded its thematic boundaries, and now only one section is dedicated to cryptography. And within the rest, a wide range of practical issues related to information security is considered. For example, two years ago the section “Internet and Information Security” debuted, and this year the sections “Investigation of incidents” were added. Mechanisms, technologies, problems, experience ”and“ Penetration testing internals ”. Every year such transformations attract more and more practitioners to participate in the conference, which favorably distinguishes RusCrypto from other information security measures, where the emphasis is often placed on the marketing orientation of the participants and their reports.
This year we took an active part in this conference, and also became sponsors of the RusKrypto CTF student competition.
In the section “Investigation of incidents. Mechanisms, technologies, problems, experience ”our report“ Malware research from the point of view of investigation of incidents ”was presented (do not judge strictly the quality of the record, it was produced by amateurs, and in no case does it pretend to be professionalism).


Unfortunately, the conference organizers did not videotape the reports, but many of them were extremely interesting. The most interesting performances, from those that managed to shoot, in our opinion, were:
opening remarks by the moderator of the section "Investigation of incidents ..." ,
“Investigation of Distributed Denial of Service Attacks (DDoS): New Approaches” by Ilya Sachkov, Group-IB CEO
“The enemy is inside PDF” Sergey Rublev, an expert on information security from Positive Technologies,
"Testing for penetration, what is ??!" Dmitry Evteev, security expert from Positive Technologies,
“Attacks on customers. JIT SPRAY technology. Writing a universal shellcode ”by Alexey Sintsov, an information security auditor from Digital Security,
“White-Box cryptography, obfuscation and software protection. The main directions of development " Dmitry Schelkunov from MSTU. N.E. Bauman,
“Extracting informational evidence from mobile phones, smartphones and PDAs” by Nikolay Golubev from Oxygen Software

')

Source: https://habr.com/ru/post/90153/


All Articles