TrackROOM |
Big PictureAugustus III + IV |
Web Apps - Nathan Hamiel*Augustus I + II |
Malware - Stefano Zanero*Augustus V + VI |
Enterprise IntriguePalace I |
92.2% Market SharePalace II |
Over the Air and In the DevicePalace III |
Mass EffectRomans I - IV |
Applied Workshop IFlorentine |
Applied Workshop IIPompeian |
1145 |
The Christopher Columbus Rule and DHS
Mark Weatherford |
AMF Testing Made Easy
Luca Carettoni |
De Mysteriis Dom Jobsivs: Mac Efi Rootkits
Loukas K |
Find Me in Your Database: An Examination of Index Security
David Litchfield |
We Have You by the Gadgets
Mickey Shkatov & Toby Kohlenberg |
iOS Kernel Heap Armageddon Revisited
Stefan Esser |
Recent Java Exploitation Trends and Malware
Jeong Wook Oh |
WORKSHOP: Lessons of Binary Analysis con't
Chrstien Rioux |
WORKSHOP: The Dark Art of IOS Application Hacking con't
Jonathan Zdziarski |
TrackROOM |
Big PictureAugustus III + IV |
Web Apps - Nathan Hamiel*Augustus I + II |
Malware - Stefano Zanero*Augustus V + VI |
Enterprise IntriguePalace I |
92.2% Market SharePalace II |
Over the Air and In the DevicePalace III |
Mass EffectRomans I - IV |
Applied Workshop IFlorentine |
Applied Workshop IIPompeian |
1415 |
Legal Aspects of Cyberspace Operations
Robert Clark |
Hacking with WebSockets
Sergey Shekyan & Vaagn Toukharian |
Dex Education: Practicing Safe Dex
Timothy Strazzere |
Passive Bluetooth Monitoring in Scapy
Ryan Holeman SYNful Deceit, Stateful Subterfuge Tom Steele & Chris Patten Stamp Out Hash Corruption, Crack All The Things Ryan Reynolds & Jonathan Claudius |
Exchanging Demands
Peter Hannay |
When Security Gets in the Way: Tools for PenTesting Mobile Apps That Use Certificate Pinning
Alban Diquet & Justine Osborne Embedded Device Firmware Vulnerability Hunting Using FRAK Ang Cui Mapping and Evolution of Android Permissions Andrew Reiter & Zach Lanier |
Digging Deep Into The Flash Sandboxes
Paul Sabanal & Mark Vincent Yason |
SNSCat: What you Don't Know About Sometimes Hurts the Most
Dan Gunter & Soloman Sonya |
WORKSHOP: Ruby for Pentesters: The Workshop
Cory Scott & Michael Tracy & Timur Duehr |
TrackROOM |
Big PictureAugustus III + IV |
Web Apps - Nathan Hamiel*Augustus I + II |
Malware - Stefano Zanero*Augustus V + VI |
Enterprise IntriguePalace I |
92.2% Market SharePalace II |
Over the Air and In the DevicePalace III |
Mass EffectRomans I - IV |
Applied Workshop IFlorentine |
Applied Workshop IIPompeian |
1530 |
Targeted Intrusion Remediation: Lessons From The Front Lines
Jim Aldridge |
Blended Threats and JavaScript: A Plan for Permanent Network Compromise
Phil Purviance & Joshua Brashars |
Hardware Backdooring is Practical
Jonathan Brossard |
Clonewise - Automated Package Clone Detection
Silvio Cesare |
Windows Phone 7 Internals and Exploitability
Tsukasa Oi |
iOS Application Security Assessment and Automation: Introducing SIRA
Justin Engler & Seth Law & Joshua Dubik & David Vo |
SQL Injection to MIPS Overflows: Rooting SOHO Routers
Zachary Cutlip |
WORKSHOP: Mobile Network Forensics
Eric Fulton |
WORKSHOP: Ruby for Pentesters: The Workshop con't
Cory Scott & Michael Tracy & Timur Duehr |
TrackROOM |
Big PictureAugustus III + IV |
Web Apps - Nathan Hamiel*Augustus I + II |
Malware - Stefano Zanero*Augustus V + VI |
Enterprise IntriguePalace I |
92.2% Market SharePalace II |
Over the Air and In the DevicePalace III |
Mass EffectRomans I - IV |
Applied Workshop IFlorentine |
Applied Workshop IIPompeian |
1700 |
Hacking the Corporate Mind: Using Social Engineering Tactics to Improve Organizational Security Acceptance
James Philput |
State of Web Exploit Toolkits
Jason Jones |
Flowers for Automated Malware Analysis
Chengyu Song & Paul Royal |
SSRF VS. Business Critical Applications
Alexander Polyakov & Dmitry Chastuhin |
Easy Local Windows Kernel Exploitations
Cesar Cerrudo |
How Many Bricks Does It Take to Crack a Microcell?
Mathew Rowley |
Hookin' Ain't Easy: BeEF Injection with MITM
Steve Ocepek & Ryan Linn |
WORKSHOP: Mobile Network Forensics con't
Eric Fulton |
WORKSHOP: Ruby for Pentesters: The Workshop con't
Cory Scott & Michael Tracy & Timur Duehr |