usenix conference policies
You are here
Security Vulnerabilities, Exploits, and Attack Patterns: 15 Years of Art, Pseudo-Science, Fun, and Profit
The emergence and widespread adoption of home computers in the '80s helped raise a generation of young technologists that thrived on the search for security bugs, development of exploit code, and devising convoluted attack patterns. Self-perceived as a group of modern libertarians, techno-artists, half-baked scientists, information age vandals, and savvy businessmen, this generation has often led the development of technologies and techniques that give shape to the modern information security industry. Viruses, software cracks, shellcodes, exploits, mass-rooters, worms, rootkits, and their corresponding defensive counterparts are artifacts of an attacking mindset in search of punishment (x)or legitimacy.
This talk will plunge into the depths of landmark attack technologies developed during the past 15 years and analyze them in the context of current and future information security trends.
Bring extra batteries for the rant-o-meter.
Ivan Arce is co-founder and CTO of Core Security Technologies where he sets the technical direction for the company and is responsible for overseeing the research, development, quality assurance, and deployment of all Core products. At Core, Ivan performed and led teams that perform network penetration testing, source code and binary software security analysis, vulnerability research, and development of offensive and defensive security software.
Prior to founding Core, he served as VP of Research and Development at a computer telephony integration company in Argentina where he was responsible for the development, testing, and deployment of mission-critical computer telephony applications. Previously, Arce spent 8 years as an information security consultant and software developer for banks, government agencies, and financial and telecommunications corporations.
Open Access Media
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.
author = {Ivan Arce},
title = {Security Vulnerabilities, Exploits, and Attack Patterns: 15 Years of Art, {Pseudo-Science}, Fun, and Profit},
booktitle = {15th USENIX Security Symposium (USENIX Security 06)},
year = {2006},
address = {Vancouver, B.C. Canada},
url = {https://www.usenix.org/conference/15th-usenix-security-symposium/security-vulnerabilities-exploits-and-attack-patterns-15},
publisher = {USENIX Association},
month = jul
}
connect with us