Training December 12 - 13 // Briefings December 14 - 15
/Abu Dhabi 2011( dec 14 )
0930 - 0945 | + opening: jeff moss | ||
0945 - 1045 | + keynote speaker: General (Ret.) Michael Hayden / ballroom 3 | ||
TRACK » | //Track One | //Track Two | //Track Three | LOCATION » | Ballroom 3 | Ballroom 2 | Ballroom 1 |
1045 - 1115 | |||
1115 - 1215 |
Barnaby Jack: Life Threatening Vulnerabilities |
Amol Sarwate: SCADA Security - Why is it so Hard? |
Francesca Bosco: Cybercrime and Organized Crime |
1215 - 1300 | + lunch break | ||
1300 - 1400 |
Nelson Elhage: Virtualization Under Attack: Breaking out of KVM |
Stefano Zanero + Federico Maggi + Alberto Volpatto: iSnoop: How to Steal Secrets From Touchscreen Devices |
Chris Sumner + Adrian M + Alison Byers: Determining Personality Traits & Privacy Concerns from Facebook Activity |
1400 - 1415 | + intermission | ||
1415 - 1515 |
Russell Spitler: Software Security Goes Mobile |
Michael Sutton: Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers |
Robert Clark: Legal Aspects of Cybersecurity |
1515 - 1545 | + networking break | ||
1545 - 1645 |
Tsukasa Oi: Yet Another Android Rootkit - /Protecting/System/Is/Not/Enough/ |
DongJoo Ha + SangMyung Choi + TaeHyung Kim + Seungyoun Han: Check Your Zombie Devices! : Analysis of the DDoS Cyber Terrorism Against the Country and Future Attacks on Various Devices |
Brad Barker: Force Multipliers and Cyber War |
/Abu Dhabi 2011( dec 15 )
0900 - 0930 | + welcome coffee | ||||||
TRACK » | //Track One | //Track Two | //Track Three | ||||
LOCATION » | Ballroom 3 | Ballroom 2 | Ballroom 1 | ||||
0945 - 1045 |
Thomas Mackenzie + Ryan Jones: Stealth Attacks - Detection and Investigation |
Katie Moussouris: From Redmond with Love! |
Ken Baylor: Financial Armageddon? Inside the Zeus and SpyEye Tidal Wave |
||||
1045 - 1115 | + networking break | ||||||
1115 - 1215 |
Jean-Philippe Aumasson: Cryptanalysis vs. Reality |
Anthony Desnos + Geoffroy Gueguen: Android : From Reversing to Decompilation |
Nikhil Mittal: Kautilya: Teensy Beyond Shell |
||||
1215 - 1300 | + lunch break | ||||||
1300 - 1400 |
John Ortiz: Introduction to More Advanced Steganography |
Peleus Uhley: Advanced Persistent Response |
Vivek Ramachandran: WORKSHOP: Advanced Wi-Fi Security Penetration Testing |
||||
1400 - 1415 | + intermission | ||||||
1415 - 1515 |
Jamal Bandukwala: Fun with Google Custom Searches: Intelligence, Secrets and Leaks |
Rich Lundeen + Jesse Ou + Travis Rhodes: New Ways I'm Going to Hack Your Web App |
Vivek Ramachandran: WORKSHOP: Advanced Wi-Fi Security Penetration Testing Cont |
||||
1515 - 1545 |
+ networking break
|
||||||
1545 - 1645 |
Andrey Belenko + Dmitry Skylarov: Evolution of iOS Data Protection and iPhone Forensics: from iphoneOS to iOS 5 |
Joshua Drake: Exploiting Memory Corruption Vulnerabilities in the Java Runtime |
Christiaan Beek: Taming Worms, RATs, Dragonsv and More! |
||||
1700 - 1830 |
+ closing reception
|
||||||
please note that the schedule is subject to change for either day |