Speaking Events

Throughout my career as a Information Security Research Scientist, I have given numerous in-depth lectures on a variety of topics within my fields of research. I’ve spoken at ToorCon, Computer Security Institue (CSI) Security eXchange, IEEE Computer Society & Consultants Network, DEFCON, Pacific Bitcoin, Austin Hackers Association, and the North Texas Snort Users Group.

Full Length Presentations | Turbo Talks

Bitcoin Time Machine 2012

I spoke on a panel at Pacific Bitcoin 2022 entitled “Bitcoin Time Machine 2012”, discussing cultural, economic, and social events and trends during the time just after Bitcoin had been released to the world.

Context-Keyed Payload Encoding

This presentation introduces a new method of keying a payload encoder which is based entirely on contextual information that is predictable or known about the target by the attacker and constructible or recoverable by the decoder stub when executed at the target. An active observer of the attack traffic, however, should be unable to decode the payload due to lack of the contextual keying information.

ToorCon 9 (2007) – PDF

Keeping 'Em Honest: Network Security and Monitoring

Today's network security and monitoring devices such as application-aware firewalls and Intrusion Detection / Intrusion Prevention Systems often come with vendor promises of up to date security profiles, attack signatures or filters which block all new attacks and exploits. Presented at CSI SX (2008).

 

Mnemonic Password
Formulas

This presentation details some of the issues facing users and managers of authentication systems involving passwords, discusses current approaches to mitigating those issues, and then finally introduces a new method for password management.

IEEE Computer Society (2007) – PDF
dc214 (2005) – PDF


 

Real-time Steganography
with RTP

Real-time Transfer Protocol (RTP) is used almost ubiquitously by Voice over IP technologies to provide an audio channel for calls. As such, it provides ample opportunity for creation of a covert communications channel due to its very nature and use in implementation.

DEFCON 15 (2007) – PDF

SmartCard Security:
GSM-SIM

An introduction to SmartCards, the GSM network, the SIM SmartCard application, and the security features and mechanisms thereof. After the introduction to the technology, this presentation covers various vulnerabilities and attacks targeted against SmartCards and the SIM application. Presented at Austin Hackers Association (2006).

 

 

Steganography Primer

An introduction to Steganography. This presentation covers what steganography is, a bit of history, and traditional and modern methods of steganography with a focus on using imagery, binary executables, and network traffic as cover-mediums. Presented at IEEE Consultants Network of Central Texas (2006), Austin Linux Users Group (2006), North Texas Snort Users Group @ UT Dallas (2006), dc214 (2005)

Stenanography Primer PDF

VoIP Attacks!

VoIP Attacks is divided into three sections – the first touching on Voice-over-IP for the uninitiated, the second section summarizing current and relevant attacks against VoIP systems, and the third focusing on mitigation techniques and what problems they may pose.

CSI (2007) – PDF
EUSecWest (2007) – PDF
IEEE Consultants Network of Central Texas (2007)
ToorCon 8 (2006) – PDF