day one /Abu Dhabi 2010( NOV 10 )
0830 - 0900 | + registration / welcome | ||
0900 - 0930 | + inauguration speech: director general, telecommunication regulatory authority | ||
0930 - 0945 | + opening: jeff moss | ||
0945 - 1045 | + keynote speaker: peiter "mudge" zatko / ballroom 3 | ||
TRACK » | //Track One | //Track Two | //Track Three | LOCATION » | Ballroom 3 | Ballroom 1 | Room 41 |
1045 - 1115 | + networking break sponsored by | ||
1115 - 1215 |
Christopher Hoff: CLOUDINOMICON: Idempotent Infrastructure, Survivable Systems & Bringing Sexy Back to Information Centricity |
Karsten Nohl: Attacking Phone Privacy |
Babak Javadi: Applying Lockpicking Fundamentals to Unknown Security Models |
1215 - 1300 | + lunch break / ballroom terrace sponsored by | ||
1300 - 1400 |
Barnaby Jack: Jackpotting Automated Teller Machines Redux |
Nils: Building Android Sandcastles in Android's Sandbox |
Jonathan Pollet, Joe Cummins: Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters |
1400 - 1415 | + intermission | ||
1415 - 1515 |
Tiffany Rad: International Cyber Jurisdiction: “Kill Switching” |
The Grugq: Base Jumping: Attacking GSM Base Station Systems and mobile phone Base Bands |
Laurent Oudot: Extrusion and Web Hacking |
1515 - 1545 | + networking break sponsored by | ||
1545 - 1645 |
Adam Laurie: RFID Security |
Zane Lackey, Don Bailey: Mobile Phony: Why You Can’t Trust Mobile Phone Networks For Critical Infrastructure |
Kay Een: NCIS Child Exploitation Investigations and Operations |
day two /Abu Dhabi 2010( NOV 11 )
0900 - 0930 | + welcome coffee | ||||||
0945 - 1045 | + keynote speaker: jeff moss / ballroom 3 | ||||||
TRACK » | //Track One | //Track Two | //Track Three | ||||
LOCATION » | Ballroom 3 | Ballroom 1 | Room 41 | ||||
1045 - 1115 | + networking break | ||||||
1115 - 1215 |
Dan Kaminsky: DNSSec |
Chris Tarnovsky: Semiconductor Security Awareness, Today and Yesterday |
Stephen A. Ridley: Escaping the Sandbox |
||||
1215 - 1300 | + lunch break / ballroom terrace sponsored by | ||||||
1300 - 1400 |
Ivan Ristic: State of SSL on the Internet: 2010 Survey, Results and Conclusions |
FX: Blitzableiter - the Release |
Dominic White: Lifting the Fog |
||||
1400 - 1415 | + intermission | ||||||
1415 - 1515 |
David Litchfield: Database Forensics |
Moxie Marlinspike: Changing Threats To Privacy: From TIA To Google |
Lavakumar Kuppan: Attacking with HTML5 |
||||
1515 - 1545 |
+ networking break
|
||||||
1545 - 1645 |
Tom Parker: Malware Attribution for Fun, Fame, Profit and War? |
Robert Hansen: HTTPS Can Byte Me |
Lukas Grunwald: RFID Enabled Passports and Government ID Documents |
||||
1700 - 1830 |
+ closing reception
|
||||||
please note that the schedule is subject to change for either day |