Way cool stuff!

George E. Kalb,
  Academic Engagements

"My binary can still beat up your binary"
George E. Kalb, July 2001


Academic Engagements

High Performance Extreme Computing Conference   Date: September 12-14, 2017
  Position: Technical Committee member   Location: Waltham, Ma

Academic Engagements

High Performance Extreme Computing Conference   Date: September 13-15, 2016
  Position: Technical Committee member   Location: Waltham, Ma

Academic Engagements

High Performance Extreme Computing Conference   Date: September 15-17, 2015
  Position: Technical Committee member   Location: Waltham, Ma

2015 National Anti-Tamper Review (NATR)   Date: April 14-16, 2015
  Position: Program Committee member
  Sessions Opening Address: "Introducing the NATR Theme"
  Session 3 Chair: Anti-Tamper Methodology
  Location: Columbia, Md

High Performance Extreme Computing Conference   Date: September 9-11, 2014
  Position: Technical Committee member   Location: Waltham, Ma

High Performance Extreme Computing Conference   Date: September 10-12, 2013
  Position: Technical Committee member   Location: Waltham, Ma

High Performance Extreme Computing Conference   Date: September 11-12, 2012
  Position: Technical Committee member   Location: Waltham, Ma

National Defense Industrial Association (NDIA)
Systems Assurance Committee
Strategies for Program Protection – Identifying Risks and Setting Requirements workshop
  Date: May 1-2, 2012
  Position: Steering Committee member   Location: Arlington, VA

16th Working Conference on Reverse Engineering   Date: October 13-16, 2009
  Position: Program Committee member   Location: Lille, France

University of Glamorgan   Date: November 21, 2008
  Title: Software Security for Embedded Systems   Location: Treforest, Wales, U.K.

15th Working Conference on Reverse Engineering   Date: October 15-18, 2008
  Position: Program Committee member   Location: Antwerp, Belgium

University of Glamorgan   Date: November 23, 2007
  Title: Software Security for Embedded Systems   Location: Treforest, Wales, U.K.

14th Working Conference on Reverse Engineering   Date: October 27-31, 2007
  Position: Program Committee member   Location: Vancouver, Canada

2nd European Conference on Computer Network Defence   Date: December 14-15, 2006
  Position: Program Committee member   Location: Treforest, Wales, U.K.

University of Glamorgan   Date: November 24, 2006
  Title: Software Security for Embedded Systems   Location: Treforest, Wales, U.K.

13th Working Conference on Reverse Engineering   Date: October 23-27, 2006
  Position: Program Committee member   Location: Benevento, Italy
  Session Chair: Session #5 - Data Reverse Engineering    

1st European Conference on Computer Network Defence   Date: December 15-16, 2005
  Position: Program Committee member   Location: Treforest, Wales, U.K.

University of Glamorgan   Date: November 25, 2005
  Title: Software Security for Embedded Systems   Location: Treforest, Wales, U.K.

12th Working Conference on Reverse Engineering   Date: November 8-11, 2005
  Position: Program Committee member   Location: Pittsburgh, PA
  Session Chair: Session #2 - Security    

University of Glamorgan   Date: January 21, 2005
  Title: Software Security for Embedded Systems   Location: Treforest, Wales, U.K.

University of Glamorgan   Date: November 26, 2004
  Title: Software Security for Embedded Systems   Location: Treforest, Wales, U.K.

University of Glamorgan   Date: November 21, 2003
  Title: Software Security for Embedded Systems   Location: Treforest, Wales, U.K.

2nd annual SouthEastern Software Engineering Conference 2003   Date: April 1-3, 2003
  Title: Contrasting Perspectives on Current and Future IA Technologies (a debate)   Location: Huntsville, AL

University of Glamorgan   Date: January 24, 2003
  Title: Software Security for Embedded Systems   Location: Treforest, Wales, U.K.

Infowar Con'02  Workshop W9: Attack Tolerance for Mission Assurance
  Title: "Emerging Technology - Tamper Resistant Software"
  Session 37 - Panel Member: "COTS: Panacea or Problem"  pic
  Workshop W9: 
 Emerging Technology - Tamper Resistant Software

Vanguard Enterprise Security Conference 2002   Date: June 25-27, 2002
  Title: Revealing the Myths Concerning Protection of Software Assets   Location: Anaheim, CA

1st annual SouthEastern Software Engineering Conference 2002   Date: April 9-11, 2002
  Title: Protecting Software Assets -
            Dispelling the Myths and Adopting New Approaches
  Location: Huntsville, AL

Swedish National Defence College   Date: March 20-21, 2002
  Title: Software Exploitation: The Tampering Threat to Software Assets   Location: Stockholm, Sweden

University of Glamorgan   Date: March 15, 2002
  Title: Software Security for Embedded Systems   Location: Treforest, Wales, U.K.

Infowar Con'01  Workshop W4: Global Information Warfare and Information Operations: Perspecive 2001
  Title: "Software Exploitation 101 - Sudden Death by Binary"
  Workshop W4: 
 Software Exploitation 101 - Sudden Death by Binary

Most Recent Publications

Title: "An Empirical Examination of the Reverse Engineering Process
  for Binary Files"
  Publication: Journal of Computers & Security
  Authors: Sutherland, Kalb, Blyth, Mulley
 
  Issue: Vol. 25, No. 3, May 2006, pp. 221-228
Available online 2 February 2006
 
Title: "Continuous Process Improvement and the Risk to Information Assurance"   Publication: IEEE Software
  Authors: Kalb, George E. & Masson, Gerald M.   Issue: Vol. 19, No. 1, Jan./Feb. 2002, pp. 84-86

Books

Title: Reversing: Secrets of Reverse Engineering   Publisher: Wiley Publishing, Inc., 2005
  Author: Eldad Eilam   Citation: Acknowledgements for Part III review
  Book Review
   
      

Return to Homepage

Photo and page design (version 4.01-01.23.17) Copyright 2017, George E. Kalb