Day1 |
//Track 1 |
//Track 2 |
//Track 3 |
//Track 4 |
//Track 5 |
//Track 6 |
//Track 7 |
//Track 8 |
//Track 9 |
0800 - 0850 |
registration breakfast |
TRACK |
//The World at Large |
//Enterprise Concerns |
//Scoping the Issue |
//Web Hacking |
//Expanding Complexity |
//Building 127.0.0.1 |
//The Mobile Track |
//Applied Knowledge Workshop Alpha |
//Applied Knowledge Workshop Beta |
Room |
Augustus I + II |
Augustus III + IV |
Augustus V + VI |
Roman |
Pompeian |
Florentine |
Milano I - IV |
Milano V - VIII |
Neopolitan I - IV |
0850 - 0950 |
+ keynote speaker:
peiter "mudge" zatko // how a hacker has helped influence the government - and vice versa // augustus ballroom |
0900 - 0950 |
+ break
|
1000 - 1100 |
Robert Clark:
Legal Aspects of Cybersecurity - (AKA) CYBERLAW: A Year in Review, Cases, issues, your questions my (alleged) answers
|
Nelson Elhage:
Virtualization under attack: Breaking out of KVM
|
Jeremiah Grossman + Brad Arkin + Alex Hutton + Adrain Lane + John Johnson:
Trillions of Lines of Code and Counting - Securing Applications At Scale
|
Kevin Johnson + Tom Eston + Joshua Abraham:
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
|
Andy Davis:
USB - Undermining Security Barriers
|
Chris Paget:
Microsoft Vista: NDA-less
The Good, The Bad, and The Ugly
|
Riley Hassell + Shane Macaulay:
Hacking Androids for Profit
|
Mark Russinovich:
Zero Day Malware Cleaning with the Sysinternals Tools
|
Thomas Roth:
Breaking Encryption in the cloud: Cheap, GPU assisted supercomputing for everyone
|
1100 - 1115 |
+ coffee service
|
1115 - 1230 |
Jennifer Granick:
The Law of Mobile Privacy and Security
|
Michael Sutton:
Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers
|
Tavis Ormandy:
Sophail: A Critical Analysis of Sophos Antivirus
|
Marco Slaviero :
Sour Pickles
|
Charlie Miller:
Battery Firmware Hacking
|
Richard Thieme:
Staring into the Abyss: The Dark Side of Secuirity and Professional Intelligence
|
Stefan Esser:
Exploiting the iOS Kernel
|
Mark Russinovich:
Zero Day Malware Cleaning with the Sysinternals Tools con't
|
Thomas Roth:
Breaking Encryption in the cloud: Cheap, GPU assisted supercomputing for everyone con't
|
1230 - 1345 |
+ lunch |
1345 - 1500 |
Moxie Marlinspike:
SSL And The Future Of Authenticity
|
David Schuetz:
Inside Apple's MDM Black Box |
James Arlen:
Security When Nano-seconds Count
|
Thomas Ptacek:
Crypto for Pentesters
|
Greg Ose:
Exploiting USB Devices with Arduino
|
Lee Kushner + Mike Murray:
InfoSec 2021 - A Career Odyssey
|
Tyler Shields + Anthony Lineberry + Charlie Miller + Chris Wysopal + Dino Dai Zovi + Ralf-Phillipp Weinmann + Nick Depetrillo + Don Bailey:
Owning Your Phone at Every Layer - A Mobile Security Panel
|
Justin Searle:
Pentesting the Smart Grid
|
Andrew Case:
Investigating Live CDs using Volatility and Physical Memory Analysis |
1500 - 1515 |
+ break Booksigning with Mark Russinovich and his book "Zero Day: A Novel"
|
1515 - 1630 |
Alessandro Acquisti:
Faces Of Facebook - Or, How The Largest Real ID Database In The World Came To Be
|
Alexander Polyakov:
A Crushing Blow At The Heart of SAP J2EE Engine
|
Fabian Yamaguchi:
Vulnerability Extrapolation or 'Give me more Bugs like that, please!'
|
Nathan Hamiel + Justin Engler + Seth law + Gregory Fleischer:
Smartfuzzing The Web: Carpe Vestra Foramina
|
Jerome Radcliffe:
Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System
|
Lee Kushner + Mike Murray:
InfoSec 2021 - A Career Odyssey con't
|
Anthony Lineberry + Tim Strazzere + Tim Wyatt:
Don't Hate the Player, Hate the Game: Inside the Android Security Patch Lifecycle
|
Justin Searle:
Pentesting the Smart Grid con't
|
Andrew Case:
Investigating Live CDs using Volatility and Physical Memory Analysis con't
|
1630 - 1645 |
+ coffee service |
1645 - 1800 |
George Chamales:
Lives On The Line: Defending Crisis Maps in Libya, Sudan, and Pakistan
|
David Litchfield:
Hacking and Forensicating an Oracle Database Server
|
Chuck Willis + Kris Britton:
Sticking to the Facts: Scientific Study of Static Analysis Tools
|
Marco Balduzzi:
Automated Detection of HPP Vulnerabilities in Web Applications
|
Adam Laurie + Zac Franken + Andrea Barisani + Daniele Bianco:
Chip & PIN is definitely broken
|
Lee Kushner + Mike Murray:
InfoSec 2021 - A Career Odyssey con't
|
Neil Daswani:
Mobile Malware Madness, and How To Cap the Mad Hatters by
|
Justin Searle:
Pentesting the Smart Grid con't |
Andrew Case
Investigating Live CDs using Volatility and Physical Memory Analysis con't
|