{"id":10519,"date":"2014-05-29T09:39:25","date_gmt":"2014-05-29T07:39:25","guid":{"rendered":"https:\/\/www.corelan.be\/?p=10519"},"modified":"2026-03-23T07:17:12","modified_gmt":"2026-03-23T06:17:12","slug":"hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/","title":{"rendered":"HITB2014AMS - Day 1 - Keynote 1: Security at the End of the Universe"},"content":{"rendered":"<p>Good morning friends, \u00a0welcome to Hack In The Box 2014, hosted at \"De Beurs van Berlage\" in the beautiful city of Amsterdam. \u00a0 This year's edition starts with a keynote by Katie Moussouris, previous lead at Microsoft Security Response Center (MSRC) and now the brand new\u00a0<a href=\"https:\/\/web.archive.org\/web\/20150420004424\/http:\/\/www.reuters.com:80\/article\/2014\/05\/28\/cybersecurity-bounties-idUSL1N0OE2CI20140528\">Chief Policy Officer at HackerOne<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"DSC_0548.jpg\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0548.jpg\" alt=\"DSC 0548\" width=\"580\" height=\"386\" border=\"0\" \/><\/p>\n<p>Katie starts the keynote by explaining that Microsoft has started the Bounty programs because they had to come up with a better way to interact with the community. \u00a0 While crediting people in the MS Security bulletins was an important \"currency\" for researchers, other companies\/bug bounty programs started offering money for vulnerability information, so MS agreed they had to do the same. \u00a0As a side effect, it was possible to get vulnerability information at an earlier stage in the product development cycle and fix bugs before a product is released.<\/p>\n<p>Katie states that \"as long as humans write code, there will always be flaws in code\". \u00a0Flaws are also caused by the fact that we innovate and continue to innovate faster. \u00a0At the same time, Katie explains, by reporting bugs, researchers show empathy with developers that work on complex enterprise software, which is a good thing.<\/p>\n<p>Researchers typically don't really care about ISO compliance and emphasizes that (most) researchers already do a great job in reporting vulnerabilities, Katie realized that this is not always the case with companies that receive these vulnerability reports. She decided to work on an 2 ISO standards (ISO 29147:2014 and ISO 30111:2013) to help to guide how companies should handle vulnerability reports. \u00a0The standard covers the entire process from receiving and processing vulnerability reports, triage bugs, perform root cause analysis, etc etc. \u00a0Adopting a standard allows companies to be more proactive instead of reactive.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"DSC_0549.jpg\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0549.jpg\" alt=\"DSC 0549\" width=\"580\" height=\"386\" border=\"0\" \/><\/p>\n<p>The security industry has been going on a very long time, a lot of bugs in a lot of systems and applications have been found, reported and fixed. A couple of researchers got together and started the \"I am the Cavalry\" movement, which is basically a \"call to action\" to the community, asking them to focus on \"hacking\" things that focus on human life and the public good (Medical devices, critical infrastructure, etc). \u00a0 Hacking a bank website is definitely important and certainly has value, she says, but there's even more important things out there.\u00a0<\/p>\n<p>\"Instead of fuzzing just applications, we should focus on Fuzzing the chain of influence\". \u00a0<\/p>\n<p>Katie explains that there's more layers involved than just software and hardware. We should focus on all layers in the ecosystem, we should try to get in front of the policy makers and work on global awareness. \u00a0We're all ambassadors. We have the ability and the technology to work together and make a better world and improve our future.<\/p>\n<p>We all have a responsibility to ourselves, to each other and the future, to take the knowledge that we have and share it with as many people as we can. Instead of copying lines of code from a book, like it used to be many years ago, we now have a network of people, of resources, to use and to rely on. \u00a0Let's all work together. \u00a0If you are a defender of networks, learn how to hack it. Break out of your comfort zones.<\/p>\n<p>\u00a0<\/p>\n<hr \/>\n<h3>About Katie Moussouris<\/h3>\n<p><a href=\"https:\/\/twitter.com\/k8em0\">Katie Moussouris<\/a>\u00a0used to lead the Security Community Outreach and Strategy team at Microsoft. Her team\u2019s work encompasses Security Ecosystem Strategy programs such as Microsoft\u2019s BlueHat conference and worldwide hacker conference engagement, security researcher outreach, Vulnerability Disclosure Policies, and MSVR (Microsoft Vulnerability Research, Microsoft\u2019s research and reporting of vulnerabilities in 3rd party software). Katie also serves as the vulnerability disclosure lead SME for the US National Body of the International Standards Organization (ISO), having performed all three roles in disclosure \u2013 finder, coordinator, and vendor for both open and closed source software.<\/p>\n<p>Katie was one of the Artists Formerly Known as @stake, and she published one of the last security advisories they released in 2004, prior to being acquired by Symantec. Katie has performed dozens of software penetration tests, security code audits, design reviews, and secure software development lifecycle reviews for major software vendors and major companies in industries across the board, from finance to e-commerce, to healthcare. She has found critical vulnerabilities and offered remediation recommendations for major components of critical infrastructure in these industries, before they could be widely exploited.<\/p>\n<p>At Symantec, Katie founded and ran the first team in Symantec\u2019s 20-year history to ever publish security vulnerability advisories in 3rd-party products. See http:\/\/www.symantec.com\/research. Katie has spoken on Vulnerability Disclosure and secure development lifecycles at several security conferences, including RSA2010, SOURCEBoston, Shmoocon, Toorcon Seattle, and she was a keynote speaker at Shakacon in June 2008. Katie spoke at Black Hat USA in August of 2008 on her program, Microsoft Vulnerability Research (MSVR), and most recently again at BlackHat USA 2010 on disclosure. Katie is also working on a book on Vulnerability Disclosure.<\/p>\n<p>Katie announced that she joined startup HackerOne, as Chief Policy Officer\u00a0<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>Good morning friends, \u00a0welcome to Hack In The Box 2014, hosted at \"De Beurs van Berlage\" in the beautiful city of Amsterdam. \u00a0 This year's edition starts with a keynote by Katie Moussouris, previous lead at Microsoft Security Response Center (MSRC) and now the brand new\u00a0Chief Policy Officer at HackerOne. Katie starts the keynote by &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"HITB2014AMS - Day 1 - Keynote 1: Security at the End of the Universe\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2250],"tags":[3783,2775,1991],"class_list":["post-10519","post","type-post","status-publish","format-standard","hentry","category-cons-seminars","tag-conference","tag-hitb","tag-fuzzing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>HITB2014AMS - Day 1 - Keynote 1: Security at the End of the Universe - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HITB2014AMS - Day 1 - Keynote 1: Security at the End of the Universe - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Good morning friends, \u00a0welcome to Hack In The Box 2014, hosted at &quot;De Beurs van Berlage&quot; in the beautiful city of Amsterdam. \u00a0 This year&#039;s edition starts with a keynote by Katie Moussouris, previous lead at Microsoft Security Response Center (MSRC) and now the brand new\u00a0Chief Policy Officer at HackerOne. Katie starts the keynote by &hellip; Continue reading &quot;HITB2014AMS - Day 1 - Keynote 1: Security at the End of the Universe&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-29T07:39:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-23T06:17:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0548.jpg\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"HITB2014AMS - Day 1 - Keynote 1: Security at the End of the Universe\",\"datePublished\":\"2014-05-29T07:39:25+00:00\",\"dateModified\":\"2026-03-23T06:17:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\\\/\"},\"wordCount\":840,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2014\\\/05\\\/DSC_0548.jpg\",\"keywords\":[\"conference\",\"hitb\",\"fuzzing\"],\"articleSection\":[\"Cons and Seminars\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\\\/\",\"name\":\"HITB2014AMS - Day 1 - Keynote 1: Security at the End of the Universe - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2014\\\/05\\\/DSC_0548.jpg\",\"datePublished\":\"2014-05-29T07:39:25+00:00\",\"dateModified\":\"2026-03-23T06:17:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2014\\\/05\\\/DSC_0548.jpg\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2014\\\/05\\\/DSC_0548.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/29\\\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HITB2014AMS - Day 1 - Keynote 1: Security at the End of the Universe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HITB2014AMS - Day 1 - Keynote 1: Security at the End of the Universe - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/","og_locale":"en_US","og_type":"article","og_title":"HITB2014AMS - Day 1 - Keynote 1: Security at the End of the Universe - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Good morning friends, \u00a0welcome to Hack In The Box 2014, hosted at \"De Beurs van Berlage\" in the beautiful city of Amsterdam. \u00a0 This year's edition starts with a keynote by Katie Moussouris, previous lead at Microsoft Security Response Center (MSRC) and now the brand new\u00a0Chief Policy Officer at HackerOne. Katie starts the keynote by &hellip; Continue reading \"HITB2014AMS - Day 1 - Keynote 1: Security at the End of the Universe\"","og_url":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2014-05-29T07:39:25+00:00","article_modified_time":"2026-03-23T06:17:12+00:00","og_image":[{"url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0548.jpg","type":"","width":"","height":""}],"author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"HITB2014AMS - Day 1 - Keynote 1: Security at the End of the Universe","datePublished":"2014-05-29T07:39:25+00:00","dateModified":"2026-03-23T06:17:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/"},"wordCount":840,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0548.jpg","keywords":["conference","hitb","fuzzing"],"articleSection":["Cons and Seminars"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/","url":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/","name":"HITB2014AMS - Day 1 - Keynote 1: Security at the End of the Universe - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/#primaryimage"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0548.jpg","datePublished":"2014-05-29T07:39:25+00:00","dateModified":"2026-03-23T06:17:12+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/#primaryimage","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0548.jpg","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0548.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/29\/hitb2014ams-day-1-keynote-1-security-at-the-end-of-the-universe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"HITB2014AMS - Day 1 - Keynote 1: Security at the End of the Universe"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":1656,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/10519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=10519"}],"version-history":[{"count":1,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/10519\/revisions"}],"predecessor-version":[{"id":17834,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/10519\/revisions\/17834"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=10519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=10519"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=10519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}