TrackROOM |
Track 1Ballroom 1 |
Track 2Ballroom 2 |
Track 3Ballroom 3 |
0945 |
Power Analysis Attacks for Cheapskates
Colin O'Flynn |
UI Redressing Attacks on Android Devices
Marcus Niemietz |
The Art of Cyberwar
Kenneth Geers |
TrackROOM |
Track 1Ballroom 1 |
Track 2Ballroom 2 |
Track 3Ballroom 3 |
1115 |
Cash is King: Who’s Wearing Your Crown?
Tom Eston + Brett Kimmell |
Introducing the Smartphone Pentest Framework
Georgia Weidman |
HTML5 Top 10 Threats – Stealth Attacks and Silent Exploits
Shreeraj Shah |
TrackROOM |
Track 1Ballroom 1 |
Track 2Ballroom 2 |
Track 3Ballroom 3 |
1300 |
Over-the-Air Cross-platform Infection for Breaking mTAN-based Online Banking Authentication
Dmitrienko + Sadeghi + Liebchen+ Davi |
Malicious URI Resolving in PDFs
Valentin Hamon |
Quantifying Maliciousness in Alexa Top-Ranked Domains
Paul Royal |
TrackROOM |
Track 1Ballroom 1 |
Track 2Ballroom 2 |
Track 3Ballroom 3 |
1415 |
Security Impacts of Abusing IPv6 Extension Headers
Antonios Atlasis |
Poking Servers with Facebook (and other Web Applications)
Riyaz Walikar |
The Art Of Exploiting Logical Flaws in Web Apps
Sumit Siddharth + Richard Dean |
TrackROOM |
Track 1Ballroom 1 |
Track 2Ballroom 2 |
Track 3Ballroom 3 |
1545 |
Enterprise Malware, There is Always A Way DNS/DNSSEC
Alberto Garcia Illera |
Stealing from Thieves: Breaking IonCube VM to Reverse Exploit Kits
Mohamed Saher |
Attacking Odata
Gursev Singh Kalra |