The Source of Knowledge will be onsite to sell audio and video recordings of the Briefings sessions.
Their booth will be located outside of the Fourth Floor (Promenade Level), Emperor's Ballroom, or click here to visit the SOK site: Dynamic malware analysis is an important method to analyze malware.
The traditional security industry has somehow decided that they are the white knights who are going to save everyone from the horror of insecure powergrids, pipelines, chemical plants, and cookie factories.
Suddenly, every consultant is an expert and every product is loudly advertising how it solves SCADA SECURITY AND COMPLIANCY ISSUES!!!
And because they don't know what the hell they're talking about -- 'fake it till ya make it' doesn't work -- they're making all of us look stupid.
Let's sit down for a little fireside chat and discuss all things SCADA and ICS with an eye towards increasing our knowledge to the point where we can confidently say: "I'm not an expert at everything, I can help some, may we work together on a solution?
However, because debuggers are originally built by software developers to debug legitimate software, they have some significant flaws against malware.
Using virtualization technology, Virt-ICE is totally invisible to malware, thus renders most available anti-debugging techniques useless.
Thanks to the isolation provided by virtual machine, Virt-ICE is out of the reach of malware, and cannot be tampered with.
Second, the speakers will overlay cellular tower data to depict coverage in a particular mobile switching center.
Next, the speakers will demonstrate how to visualize an individual traveling across adjacent mobile switching centers and the cell towers they are likely to associate with.