George E. Kalb,
| |
"My binary can still beat up your binary" |
Academic Engagements
High Performance Extreme Computing Conference | Date: September 12-14, 2017 | |
Position: Technical Committee member | Location: Waltham, Ma |
Academic Engagements
High Performance Extreme Computing Conference | Date: September 13-15, 2016 | |
Position: Technical Committee member | Location: Waltham, Ma |
Academic Engagements
High Performance Extreme Computing Conference | Date: September 15-17, 2015 | |
Position: Technical Committee member | Location: Waltham, Ma |
2015 National Anti-Tamper Review (NATR) | Date: April 14-16, 2015 | |
Position: Program Committee member Sessions Opening Address: "Introducing the NATR Theme" Session 3 Chair: Anti-Tamper Methodology |
Location: Columbia, Md |
High Performance Extreme Computing Conference | Date: September 9-11, 2014 | |
Position: Technical Committee member | Location: Waltham, Ma |
High Performance Extreme Computing Conference | Date: September 10-12, 2013 | |
Position: Technical Committee member | Location: Waltham, Ma |
High Performance Extreme Computing Conference | Date: September 11-12, 2012 | |
Position: Technical Committee member | Location: Waltham, Ma |
National Defense Industrial Association
(NDIA) Systems Assurance Committee Strategies for Program Protection – Identifying Risks and Setting Requirements workshop |
Date: May 1-2, 2012 | |
Position: Steering Committee member | Location: Arlington, VA |
16th Working Conference on Reverse Engineering | Date: October 13-16, 2009 | |
Position: Program Committee member | Location: Lille, France |
University of Glamorgan | Date: November 21, 2008 | |
Title: Software Security for Embedded Systems | Location: Treforest, Wales, U.K. |
15th Working Conference on Reverse Engineering | Date: October 15-18, 2008 | |
Position: Program Committee member | Location: Antwerp, Belgium |
University of Glamorgan | Date: November 23, 2007 | |
Title: Software Security for Embedded Systems | Location: Treforest, Wales, U.K. |
14th Working Conference on Reverse Engineering | Date: October 27-31, 2007 | |
Position: Program Committee member | Location: Vancouver, Canada |
2nd European Conference on Computer Network Defence | Date: December 14-15, 2006 | |
Position: Program Committee member | Location: Treforest, Wales, U.K. |
University of Glamorgan | Date: November 24, 2006 | |
Title: Software Security for Embedded Systems | Location: Treforest, Wales, U.K. |
13th Working Conference on Reverse Engineering | Date: October 23-27, 2006 | |
Position: Program Committee member | Location: Benevento, Italy | |
Session Chair: Session #5 - Data Reverse Engineering |
1st European Conference on Computer Network Defence | Date: December 15-16, 2005 | |
Position: Program Committee member | Location: Treforest, Wales, U.K. |
University of Glamorgan | Date: November 25, 2005 | |
Title: Software Security for Embedded Systems | Location: Treforest, Wales, U.K. |
12th Working Conference on Reverse Engineering | Date: November 8-11, 2005 | |
Position: Program Committee member | Location: Pittsburgh, PA | |
Session Chair: Session #2 - Security |
University of Glamorgan | Date: January 21, 2005 | |
Title: Software Security for Embedded Systems | Location: Treforest, Wales, U.K. |
University of Glamorgan | Date: November 26, 2004 | |
Title: Software Security for Embedded Systems | Location: Treforest, Wales, U.K. |
University of Glamorgan | Date: November 21, 2003 | |
Title: Software Security for Embedded Systems | Location: Treforest, Wales, U.K. |
2nd annual SouthEastern Software Engineering Conference 2003 | Date: April 1-3, 2003 | |
Title: Contrasting Perspectives on Current and Future IA Technologies (a debate) | Location: Huntsville, AL |
University of Glamorgan | Date: January 24, 2003 | |
Title: Software Security for Embedded Systems | Location: Treforest, Wales, U.K. |
Infowar Con'02 Workshop W9: Attack Tolerance
for Mission Assurance Title: "Emerging Technology - Tamper Resistant Software" Session 37 - Panel Member: "COTS: Panacea or Problem" pic |
Vanguard Enterprise Security Conference 2002 | Date: June 25-27, 2002 | |
Title: Revealing the Myths Concerning Protection of Software Assets | Location: Anaheim, CA |
1st annual SouthEastern Software Engineering Conference 2002 | Date: April 9-11, 2002 | |
Title: Protecting Software Assets - Dispelling the Myths and Adopting New Approaches |
Location: Huntsville, AL |
Swedish National Defence College | Date: March 20-21, 2002 | |
Title: Software Exploitation: The Tampering Threat to Software Assets | Location: Stockholm, Sweden |
University of Glamorgan | Date: March 15, 2002 | |
Title: Software Security for Embedded Systems | Location: Treforest, Wales, U.K. |
Infowar Con'01 Workshop W4: Global Information
Warfare and Information Operations: Perspecive 2001 Title: "Software Exploitation 101 - Sudden Death by Binary" |
Most Recent Publications
Title: "An Empirical Examination of the Reverse Engineering Process for Binary Files" |
Publication: Journal of Computers & Security | |
Authors: Sutherland, Kalb, Blyth, Mulley |
Issue: Vol. 25, No. 3, May 2006, pp. 221-228 Available online 2 February 2006 | |
Title: "Continuous Process Improvement and the Risk to Information Assurance" | Publication: IEEE Software | |
Authors: Kalb, George E. & Masson, Gerald M. | Issue: Vol. 19, No. 1, Jan./Feb. 2002, pp. 84-86 |
Books
Title: Reversing: Secrets of Reverse Engineering | Publisher: Wiley Publishing, Inc., 2005 | |
Author: Eldad Eilam | Citation: Acknowledgements for Part III review | |
Book Review | ||
Photo and page design (version 4.01-01.23.17) Copyright 2017, George E. Kalb