Daniel Peck
Barracuda Networks
Atlanta,
GA
USA
Biographical Sketch: Baythreat 2012 - Dynamic Analysis and Exploration of Android Apps
BSides Atlanta 2012 - Dynamic Analysis and Exploration of Android Apps
Infosecurity Belgium 2012 - Friend of Foe, who wants to be your friend on Facebook and Twitter
Source Boston 2012 - Fakebook: Attackers' use of Fake Profiles and Apps
Baythreat 2011 - Analyzing Social Networks for Security Data - A Brief Overview of My Findings and Thoughts on Building Your Own Toolkit
GOVCERT.NL Symposium 2011 - Collecting Eyeballs: Measuring and Analyzing Malicious On Twitter and Facebook
BSides Atlanta 2011 - Security Consequences, Thinning the Herd
Hacker Halted 2011 - Collecting Eyeballs : Measuring And Analyzing Malicious Activity On Twitter And Facebook
NinjaCon 11 - The Dark Side of Social Media: Measuring & Malicious Activity On Twitter and Facebook
Appsec Europe 2011 - Measuring and Analyzing Malicious Activity On Twitter
RSA USA 2011 - The Dark Side of Twitter
BSides San Francisco 2011 - Lessons Learned From Running a Bug Bounty Program
Baythreat 2010 - Future Proofing The Botnet
BSides Atlanta 2010 - Demystifying Web Malware
SCADA Security Scientitfic Symposium (S4) 2010 - Comparative Anaylsis of Embedded Operating Systems in Control System Devices
SCADA Security Scientitfic Symposium (S4) 2009 - Leveraging Ethernet Card Vulnerabilities in Field Devices
Defcon 14 - Caffeine Monkey. Automated Collection, Detection and Analysis of Malicious JavaScript
Blackhat USA 2007 - Caffeine Monkey. Automated Collection, Detection and Analysis of Malicious JavaScript
Papers:
All the network is a stage, and the APKs merely players: Scripting Android Applications