First International Alternative Workshop on Aggressive Computing and Security

http://www.esiea-recherche.eu/iawacs_2009.html

•Cryptanalysis techniques
•Steganalysis techniques
•Malicious cryptography
•Advances computer virology techniques (malware, backdoor…)
•Active security product analysis and testing
•Active security auditing
•Mathematical concepts and applications with respect to the attacker’s view
•Cyberwarfare techniques
•Cryptographic and steganography techniques
•Invisible trap/bacdoor techniques in algorithms and applications
•Implementation attacks
•Interception/eavesdropping techniques
•Forensics and anti-forensics techniques
•Tempest and anti-tempest techniques
•InfoOps techniques
•Satellite hijacking