TrackROOM |
Track 1Ballroom 1 |
Track 2Ballroom 2 |
Track 3Ballroom 3 |
1115 |
Social Engineering Threats and Countermeasures In An Overly Connected World
Shane McDougall |
Practical Security Testing for LTE Networks
Martyn Ruks + Nils |
Legal Aspects of Cyberspace Operations - Hacking Back, Active Response and More
Robert Clark |
TrackROOM |
Track 1Ballroom 1 |
Track 2Ballroom 2 |
Track 3Ballroom 3 |
1300 |
Cybercrime Kill Chain vs. Effectiveness of Defense Layers
Francisco Artes + Stefan Frei |
Breaking and Fixing the Smart Grid
Justin Searle |
Lessons from the History of Cyber Conflict
Jason Healey |
TrackROOM |
Track 1Ballroom 1 |
Track 2Ballroom 2 |
Track 3Ballroom 3 |
1415 |
Reverse and Simulate your Enemy Botnet C&C
Frederic Guihery + Georges Bossert |
Inspection of Windows Phone Applications
Dmitriy Evdokimov + Andrey Chasovskikh |
Targeted Intrusion Remediation: Lessons From The Front Lines
Jim Aldridge |
TrackROOM |
Track 1Ballroom 1 |
Track 2Ballroom 2 |
Track 3Ballroom 3 |
1545 |
The Endless Game, Fighting Against Kelihos Botnet
Kyle Yang |
The Droid Exploitation Saga
Aditya Gupta + Subo Halder |
Huawei Router Security
Felix Linder |