• 08:00
  • Registration at Royale Registration Desk

    Jeff Moss
    Sun, 08:00 - 12:00
    Capri Room 111
  • 10:00
  • The Search for Perfect Handcuffs... and the Perfect Handcuff Key

    Deviant Ollam
    Sun, 10:00 - 10:50
    Royale 2-3-4 - Track 1
  • Web Services We Just Don't Need

    Mike Bailey
    Sun, 10:00 - 10:50
    Royale 6-7-8 - Track 4
  • Browser Based Defenses

    James Shewmaker
    Sun, 10:00 - 10:50
    Royale 5 - Track 3
  • Multiplayer Metasploit: Tag-Team Penetration and Information Gathering

    Ryan Linn
    Sun, 10:00 - 10:50
    Royale 1 - Track 2
  • WiMAX Hacking 2010

    aSMig, Goldy, Pierce
    Sun, 10:00 - 10:50
    Grande E-F - Track 5
  • I know where your credit card is...

    Bruno Gonçalves de Oliveira
    Sun, 10:00 - 11:00
    Skybox 206 - Skytalks
  • 11:00
  • Attack the Key, Own the Lock

    datagram, Schuyler Towne
    Sun, 11:00 - 11:50
    Royale 2-3-4 - Track 1
  • IPv6: No Longer Optional

    John Curran
    Sun, 11:00 - 11:50
    Royale 6-7-8 - Track 4
  • Constricting the Web: Offensive Python for Web Hackers

    Nathan Hamiel, Marcin Wielgoszewski
    Sun, 11:00 - 11:50
    Royale 5 - Track 3
  • Balancing the Pwn Trade Deficit

    Colin Ames, Anthony Lai, Val Smith
    Sun, 11:00 - 11:50
    Royale 1 - Track 2
  • Hardware Hacking for Software Guys

    Dave King
    Sun, 11:00 - 11:50
    Grande E-F - Track 5
  • Why Security People Suck

    Gene Bransfield
    Sun, 11:00 - 12:00
    Skybox 206 - Skytalks
  • 12:00
  • PCI, Compromising Controls and Compromising Security

    Jack Daniel
    Sun, 12:00 - 12:50
    Royale 2-3-4 - Track 1
  • Exploitation on ARM - Technique and Bypassing Defense Mechanisms

    Itzhak Avraham
    Sun, 12:00 - 12:50
    Royale 6-7-8 - Track 4
  • Repelling the Wily Insider

    Matias Madou, Jacob West
    Sun, 12:00 - 12:50
    Royale 5 - Track 3
  • Powershell...omfg

    Joshua Kelley, David Kennedy
    Sun, 12:00 - 12:50
    Royale 1 - Track 2
  • Electronic Weaponry or How To Rule the World While Shopping at Radio Shack

    TW Otto
    Sun, 12:00 - 12:50
    Grande E-F - Track 5
  • Social Engineering and Target Profiling with 100% Accuracy

    Dave Marcus
    Sun, 12:00 - 13:00
    Skybox 206 - Skytalks
  • 13:00
  • How I Met Your Girlfriend

    Samy Kamkar
    Sun, 13:00 - 13:50
    Royale 2-3-4 - Track 1
  • Implementing IPv6 at ARIN

    Matt Ryanczak
    Sun, 13:00 - 13:50
    Royale 6-7-8 - Track 4
  • The Anatomy of Drug Testing

    Jimi Fiekert
    Sun, 13:00 - 13:50
    Royale 5 - Track 3
  • Build Your Own Security Operations Center for Little or No Money

    Josh Pyorre
    Sun, 13:00 - 13:50
    Royale 1 - Track 2
  • ChaosVPN for Playing CTFs

    mc.fly, no_maam, ryd, Vyrus
    Sun, 13:00 - 13:50
    Grande E-F - Track 5
  • Roman Profiles: The Six Mistakes

    Eric Smith
    Sun, 13:00 - 14:00
    Skybox 206 - Skytalks
  • 14:00
  • Decoding reCAPTCHA

    Chad Houck
    Sun, 14:00 - 14:50
    Royale 2-3-4 - Track 1
  • Breaking Bluetooth By Being Bored

    JP Dunning
    Sun, 14:00 - 14:50
    Royale 6-7-8 - Track 4
  • A New Approach to Forensic Methodology - !!BUSTED!! Case Studies

    Samuel Petreski, David C. Smith
    Sun, 14:00 - 14:50
    Royale 5 - Track 3
  • Seccubus - Analyzing vulnerability assessment data the easy way...

    Frank Breedijk
    Sun, 14:00 - 14:50
    Royale 1 - Track 2
  • The Games We Play

    Brandon Nesbit
    Sun, 14:00 - 14:50
    Grande E-F - Track 5
  • You want me to let you do WHAT!

    John B. Hoopes
    Sun, 14:00 - 15:00
    Skybox 206 - Skytalks
  • 15:00
  • So Many Ways to Slap A Yo-Ho:: Xploiting Yoville and Facebook for Fun and Profit

    strace
    Sun, 15:00 - 15:50
    Royale 2-3-4 - Track 1
  • SMART Project: Applying Reliability Metrics to Security Vulnerabilities

    Blake Self, Dolores Zage, Wayne Zage
    Sun, 15:00 - 15:50
    Royale 6-7-8 - Track 4
  • Open Source Framework for Advanced Intrusion Detection Solutions

    Patrick Mullen, Ryan Pentney
    Sun, 15:00 - 15:50
    Royale 5 - Track 3
  • Toolsmithing an IDA Bridge, Case Study For Building A Reverse Engineering Tool"

    Adam Pridgen
    Sun, 15:00 - 15:50
    Royale 1 - Track 2
  • Kartograph : Finding a Needle in a Haystack or How to Apply Reverse Engineering Techniques to Cheat at Video Games

    Dan Boneh, Elie Bursztein, Jocelyn Lagarenne
    Sun, 15:00 - 15:50
    Grande E-F - Track 5
  • TBA

    Yeti
    Sun, 15:00 - 16:00
    Skybox 206 - Skytalks
  • 16:00
  • Social Networking Special Ops: Extending Data Visualization Tools for Faster Pwnage

    The Suggmeister
    Sun, 16:00 - 16:50
    Royale 2-3-4 - Track 1
  • ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically

    Jeongwook Oh
    Sun, 16:00 - 16:50
    Royale 6-7-8 - Track 4
  • Sniper Forensics - One Shot, One Kill

    Christopher E. Pogue
    Sun, 16:00 - 16:50
    Royale 5 - Track 3
  • You Spent All That Money And You Still Got Owned...

    Joseph McCray
    Sun, 16:00 - 16:50
    Royale 1 - Track 2
  • Gaming in the Glass Safe - Games, DRM and Privacy

    Ferdinand Schober
    Sun, 16:00 - 16:50
    Grande E-F - Track 5
  • Story Time

    Panel
    Sun, 16:00 - 17:00
    Skybox 206 - Skytalks
  • 17:00
  • Getting Social with the Smart Grid

    Tony Flick, Justin Morehouse
    Sun, 17:00 - 17:50
    Royale 2-3-4 - Track 1
  • Function Hooking for Mac OSX and Linux

    Joe Damato
    Sun, 17:00 - 17:50
    Royale 6-7-8 - Track 4
  • 0box Analyzer: AfterDark Runtime Forensics for Automated Malware Analysis and Clustering

    Jeremy Chiu, Wayne Huang
    Sun, 17:00 - 17:50
    Royale 5 - Track 3
  • SHODAN for Penetration Testers

    Michael Schearer
    Sun, 17:00 - 17:50
    Royale 1 - Track 2
  • Securing MMOs: A Security Professional's View From the Inside

    metr0
    Sun, 17:00 - 17:50
    Grande E-F - Track 5
  • 18:00
  • Awards Ceremonies hosted by Dark Tangent

    Jeff Moss
    Sun, 18:00 - 19:00