THREADS is an annual conference that focuses on pragmatic security research and new discoveries in network attack and defense. Held each year during NYU-Poly's Cyber Security Awareness Week (CSAW) in Brooklyn, NY, THREADS is organized by NYU-Poly Hackers in Residence Dan Guido and Dino Dai Zovi with the help of cyber security students at the university.
THREADS aims to present and discuss cutting edge, peer reviewed, industrial and academic research in computer and network security. THREADS focuses on developments and advances in attack techniques and attacker methodologies. We want to discuss what vulnerabilities exist and how attackers of today and tomorrow exploit those vulnerabilities.
In 2011, DARPA launched Cyber Fast Track and led a revolution in government-funded cybersecurity research. For the first time, individual hackers could pitch their own great ideas and, if selected, receive government funding for their projects immediately. For 18 months, DARPA came to agreements with over 100 commercial firms to fund cutting-edge advancements in information security that have now made their way into open-source and commercial products. This year’s THREADS conference highlights some of the best tools, products and research to come out of the Cyber Fast Track program and gives you the opportunity to hear from the researchers themselves.
An album of all the recorded talks from THREADS 2013 is available on Vimeo.
|Peiter "Mudge" Zatko
Assured Information Security
|Measurement of Running Executables|
|Detecting Patterns of Theft with Pyrometers|
|Mark Haase, Chris Taylor
Hidden Layer LLC
|Static Code Analysis with Machine Learning|
|Tomislav Pericin, Mario Vuksan
|Detecting OS X and Windows Bootkits with RDFU|
|Vico Marziale, Joe Sylve
|Differential Analysis of Malware in RAM|
|Michael Costello, Ang Cui
Red Balloon Security
|Firmware Fun Time|
|BIOS Integrity Measurements Heuristics Tool|
|A Crowd-Trained Machine Learning Model for Malware Capability Detection|
Great Scott Gadgets
|HackRF: A Low Cost Software Defined Radio Platform|
|PANEL: Are Reversing and Exploitation an Art or a Science?
|Could a purpose-built supercomputer play DEFCON capture the flag?|
|Nasir Memon, NYU-Poly||Opening Remarks [video]|
|Dan Guido, NYU-Poly||Executive Overview: NYU-Poly & Mobile Security [video] [slides]|
|Dino Dai Zovi, NYU-Poly||iOS Jailbreak Analysis [video] [slides]|
|Mike Arpaia, iSEC Partners||Mobile Exploit Intelligence Project [video] [slides]|
|Collin Mulliner, NEU||Probing Mobile Operator Networks [video] [slides]|
|Vincenzo Iozzo, Trail of Bits||A Tale of Mobile Threats [video] [slides]|
|Chris Rohlf, Leaf SR||Analysis of the Google Native Client Sandbox [paper] [slides]|
|Jon Oberheide, DUO Security||Mobile Vulnerability Assessment: There's an App for That [website] [blog]|
We would like to thank Evan Jensen at NYU-Poly for his assistance organizing THREADS 2012.