Muhammad Mudassar Yamin

Research Fellow Norwegian University of Science and Technology

SPEAKER INTERVIEW AVAILABLE
BIOGRAPHY

Mudassar is currently working as a research fellow at the department of Information and Communication Technology in Norwegian University of Science and Technology. He is the member of system security research group and the focus of his research is system security, penetration testing, security assessment, intrusion detection. He is currently working on the modelling of attack and defenses scenarios for cyber security exercises in a cyber range. Mudassar recently led the joint civil military team from Norway in Atlantic Council Cyber 9/12 strategy challenge. He received Innovation medal from Interpol for developing smart city policing concepts and is also involved with Interpol World Expert Group on IoT and Smart City Policing. Before joining NTNU Mudassar was an Information Security consultant and served multiple government and private clients. He performed cyber operations ranging from counter terrorism to security assessment of major financial institutions.

He holds the following cyber security certifications: OSCP, LPT Master, CPTE, CEH, CHFI, CBP, CISSO, CCNA, Cyber Ops, KLSE

Windows Based Exploit Chains and Their Detection Mechanism

This article presents a novel algorithm for the detection of exploit chains in a Windows based environment. An exploit chain is a group of exploits that executes synchronously, in order to achieve the system exploitation. Unlike high-risk vulnerabilities that allow system exploitation using only one execution step, an exploit chain takes advantage of multiple medium and low risk vulnerabilities. These are grouped, in order to form a chain of exploits that when executed achieve the exploitation of the system. Experiments were performed to check the effectiveness of developed algorithm against multiple anti-virus/anti-malware solutions available in the market.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Alex “Jay” Balan

Chief Security Researcher Bitdefender

Bianca Lewis

CEO Girls Who Hack

Christina Kubecka

CEO HypaSec

SPEAKER INTERVIEW AVAILABLE

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

As an infrastructure operator, technology integrator and IT&C services provider, Orange Business Services supports businesses and public entities in their digital transformation. Collect, transport, protect, store and process and analyze: they orchestrate every phase of the data journey, for your business to create even more value.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNERS
VIP & SPEAKER LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS