The people from COSEINC know how to throw conferences, but Syscan 2014 can easily be their best... ever! The quality of the talks were outstanding and it's hard to pick up one or two, it was like a best-of album of infosec. I suppose the reason is that no speaker will do a 20+ hour flight for a half-ass talk. There was this talk when this guy Joxean Koret (@matalaz) released lots of 0-days for all majors anti-virus. Interesting days for windows users I suppose :)
"Hardware hacking" talks were particularly good, with Snare (@Snare) creating a complete PCIe system out of an FPGA to gain code-execution via the thunderbolt adapter. Josh Thomas (@Monk_dot) hacking power controllers, a great (and dangerous) idea, Adam Laurie (@rfidiot) presenting a great hardware platform for RFID pwnage, and Charlie Miller (@0xcharlie) and Chris Valasek doing awesome CAN-bus controller hacking. Finally, Corey Kallenberg (@coreykal) and John Butterworth did a great talk, those guys can't stop finding ways to execute code in your BIOS.
more here....https://sites.google.com/a/groundworkstech.com/index/blog/syscan-2014---deep-submicron-backdoors-and-one-more-thing
"Hardware hacking" talks were particularly good, with Snare (@Snare) creating a complete PCIe system out of an FPGA to gain code-execution via the thunderbolt adapter. Josh Thomas (@Monk_dot) hacking power controllers, a great (and dangerous) idea, Adam Laurie (@rfidiot) presenting a great hardware platform for RFID pwnage, and Charlie Miller (@0xcharlie) and Chris Valasek doing awesome CAN-bus controller hacking. Finally, Corey Kallenberg (@coreykal) and John Butterworth did a great talk, those guys can't stop finding ways to execute code in your BIOS.
more here....https://sites.google.com/a/groundworkstech.com/index/blog/syscan-2014---deep-submicron-backdoors-and-one-more-thing