Day 2 • 15 October 2004 |
09:00 - 09:30 |
Registration |
|
Track 1
|
Track 2
|
Location & Times |
Conference Hall |
Media Hall |
09:30 - 11:00 |
You got that with GOOGLE?
Johnny Long
|
Understanding Hardware Security
Joe Grand
|
11:00 - 11:20 |
|
11:20 - 12:10 |
Optimized Attacking for NTLM2 Session Response
Daiji Sanai & Hidenobu Seki
|
Thinking Techie's Social Responsibility - Lessons Fom Winny Case
Shunichi Arai
|
12:10 - 13:10 |
Lunch - Bento Boxes will be available |
|
13:10 - 14:40 |
When the Tables Turn
Charl van der Walt
|
The Keys to the Kingdom: Understanding Covert Channels of Communication
Russ Rogers
|
14:40 - 15:00 |
|
15:00 - 15:50
|
Environment Dependencies in Windows Exploitation
Yuji Ukai
|
Cybercrime Treaty and Legal Environment of Japanese Computer Crime and Laws
Hisamichi Okamura
|
15:50 - 16:00
|
Closing Remarks & Thank You to the Sponsors - Jeff Moss - Conference Hall
|