Daniel Peck

Barracuda Networks
Atlanta, GA
USA


Biographical Sketch:
Baythreat 2012 - Dynamic Analysis and Exploration of Android Apps BSides Atlanta 2012 - Dynamic Analysis and Exploration of Android Apps Infosecurity Belgium 2012 - Friend of Foe, who wants to be your friend on Facebook and Twitter Source Boston 2012 - Fakebook: Attackers' use of Fake Profiles and Apps Baythreat 2011 - Analyzing Social Networks for Security Data - A Brief Overview of My Findings and Thoughts on Building Your Own Toolkit GOVCERT.NL Symposium 2011 - Collecting Eyeballs: Measuring and Analyzing Malicious On Twitter and Facebook BSides Atlanta 2011 - Security Consequences, Thinning the Herd Hacker Halted 2011 - Collecting Eyeballs : Measuring And Analyzing Malicious Activity On Twitter And Facebook NinjaCon 11 - The Dark Side of Social Media: Measuring & Malicious Activity On Twitter and Facebook Appsec Europe 2011 - Measuring and Analyzing Malicious Activity On Twitter RSA USA 2011 - The Dark Side of Twitter BSides San Francisco 2011 - Lessons Learned From Running a Bug Bounty Program Baythreat 2010 - Future Proofing The Botnet BSides Atlanta 2010 - Demystifying Web Malware SCADA Security Scientitfic Symposium (S4) 2010 - Comparative Anaylsis of Embedded Operating Systems in Control System Devices SCADA Security Scientitfic Symposium (S4) 2009 - Leveraging Ethernet Card Vulnerabilities in Field Devices Defcon 14 - Caffeine Monkey. Automated Collection, Detection and Analysis of Malicious JavaScript Blackhat USA 2007 - Caffeine Monkey. Automated Collection, Detection and Analysis of Malicious JavaScript

Papers:
All the network is a stage, and the APKs merely players: Scripting Android Applications