Akamai Diversity

The Akamai Blog

CanSecWest Vancouver and PWN2OWN 2014

All our attention may be on RSA and BSidesSF right now, but it's worth noting that the 14th annual CanSecWest conference will be held shortly after, from March 12-14 at the Sheraton Wall Centre Hotel in downtown Vancouver, British Columbia.

This conference has attracted some controversy in recent years, and some wondered if the event would happen this time around. Paul Ducklin wrote in Sophos' Naked Security blog, for example:

For a while, late in 2013, things didn't look too good for the annual Vancouver-based security conference CanSecWest, or for PWN2OWN, the elite hacking sideshow at the event that has in many ways eclipsed the conference itself. It looked as though the conference and its accoutrements might implode, sucked into a total malware perspective vortex. In October 2013, CanSecWest founder and organiser Dragos Ruiu went public to claim that he was under a sustained attack from the world's worst-ever malware, a cybernetic Hydra that became known as #BadBIOS. But the malware now seems to have vanished without a trace, and both his reputation and his network seem to have survived the onslaught. So there will be a CanSecWest 2014, after all, and -- it has now officially been announced -- another PWN2OWN.

The CanSecWest is single track, with one-hour presentations over the duration beginning at 9:00 a.m. each day. The CanSecWest website offers a glimpse at some of this year's talks and the speakers presenting them:

  • Copernicus 2, SENTER the Dragon - Xeno Kovah, John Butterworth, Corey Kallenberg, Sam Cornwell; MITRE
  • All Your Boot Are Belong To Us - Corey Kallenberg, Yuriy Bulygin, Andrew Furtak, Oleksandr Bazhaniuk, John Loucaides, Xeno Kovah, John Butterworth, Sam Cornwell ; from Intel and MITRE
  • Outsmarting Bluetooth Smart (a.k.a. Bluetooth LE) - Mike Ryan ; iSEC Partners
  • The Real Deal of Android Device Security: the Third Party - Colin Mulliner , Jon Oberheide ; Northwestern University, Duo Security
  • Hacking 9/11 - The next is likely to be even bigger with an ounce of cyber - Eric Filiol ; Operational Cryptology and Virology Lab EISEA
  • No Apology Required: Deconstructing Blackberry10 - Zach Lanier, Ben Nei ; Duo Security & Accuvant
  • USB Flash Storage Threats and Threat Mitigation in an Air-Gapped Network Environment - George Pajari, HCIS
  • Vital Point Attack: Write Once, Run Anywhere Bypass - Yang "tombkeeper" Yu ; NSFOCUS Labs
  • Exploring in the Wild: A Big Data Approach to Application Security Research (and Exploit Detection) - Haifei Li, Bing Sun ; McAfee ai.k.a. Intel Security
  • Intelligent Use of Intelligence: Design to Discover - Ping Yan ; OpenDNS
  • Concurrency: a problem and opportunity in the exploitation of memory corruptions - Ralph-Phillipp Weinmann
  • Countermeasure Bypass - Yan Tao "ga1ois" ; NSFOCUS Labs