Skip to main content

If You Are Attending Ekoparty in Argentina...

September 14, 2010

Hello internet-sphere,

My name is Chris Valasek and I’m the newest edition to the Accuvant LABS research team. I will be working alongside Chief Research Scientist Ryan Smith on a variety of subjects. While I mainly do reverse engineering and exploitation related work, we have plans to work on a wide array of internet awesomeness.

Additionally, I wanted to let everyone know that I will be speaking at Ekoparty (http://www.ekoparty.org) in Buenos Aires, Argentina, September 16-17. Ekoparty is on its sixth year and appears to be getting bigger and better as time goes on. I am truly honored to be speaking this year and hope to make subsequent conferences as well. I look forward not only to speaking, but also to chatting with all the South Americans about computer security in general. I will try to keep everyone posted on some of the conversations I have via Twitter at @nudehaberdasher.

My topic at the show will be Understanding the Low Fragmentation Heap: From Allocation to Exploitation, which specifically focuses on how the heap manager in Windows 7 (32-bit) works. It covers topics ranging from data structures to exploitation techniques and is useful for security professionals to software developers. If you have any interest in modern Windows memory management then I’d suggest stopping by if you live near Buenos Aires, otherwise, please feel free to read the following paper/slides that were presented on the same topic at Blackhat USA 2010 in Las Vegas, Nevada.

Again, for real-time info, don’t hesitate to follow me on Twitter for more frequent updates about my work and presentations (@nudehaberdasher).

http://www.illmatics.com/Understanding_the_LFH.pdf
http://www.illmatics.com/Understanding_the_LFH_Slides.pdf

Related Blogs

May 10, 2017

PCI Compliance Every Day

The title of this post sounds daunting, does it not? However, achieving PCI compliance every day is not as daunting as you might think. With the relea...

See Details

January 10, 2012

PCI Compliance – Your First Three Steps to Compliance

We’ve all been there. You are sitting at your desk, minding your own business, and someone drops off a letter addressed to the PCI Compliance Officer....

See Details

June 28, 2017

Petya / Petna / NotPetya Ransomware Recommendations from the Trenches

Here we go again. Not long ago I updated a blog post containing actionable recommendations to protect your environment from ransomware threats, includ...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Related Insights

April 09, 2014

The Evolution of Malware and Security Compromise

Malware is evolving and changing at an unprecedented rate. The fact is that 95% of all organizations have been compromised, without their knowledge, i...

See Details

January 20, 2014

POS Malware - A Long-Term Mitigation Solution | Optiv

It has been reported that the KAPTOXA operation responsible for recent breaches to two major retailers – and potentially more – utilized a variant of ...

See Details

March 17, 2014

AutoIT Scripting in POS Malware

Over the past few years, using AutoIT scripting language to create and install malware has become more prevalent. This trend has made its way into the...

See Details

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.