• Royalle Ballroom, 2nd on left

  • Thursday, July 29
  • DC 18 Movie Night - GET LAMP

    Jason Scott
    Thu, 19:00 - 21:00
    Royale 1 - Track 2
  • Movie Night - GET LAMP

     
    Thu, 21:00 - 23:00
    Royale 1
  • Friday, July 30
  • SIE Passive DNS and the ISC DNS Database

    Paul Vixie
    Fri, 10:00 - 10:50
    Royale 1 - Track 2
  • Cloud Computing, a Weapon of Mass Destruction?

    Mike Anderson, David Bryan
    Fri, 11:00 - 11:50
    Royale 1 - Track 2
  • How Unique Is Your Browser?

    Peter Eckersley
    Fri, 12:00 - 12:50
    Royale 1 - Track 2
  • Token Kidnapping's Revenge

    Cesar Cerrudo
    Fri, 13:00 - 13:50
    Royale 1 - Track 2
  • Lord of the Bing: Taking Back Search Engine Hacking from Google and Bing

    Francis Brown, Rob Ragan
    Fri, 14:00 - 14:50
    Royale 1 - Track 2
  • Tales from the Crypto

    G. Mark Hardy
    Fri, 15:00 - 15:50
    Royale 1 - Track 2
  • Exploiting WebSphere Application Server's JSP Engine

    Ed Schaller
    Fri, 16:00 - 16:50
    Royale 1 - Track 2
  • Hacking Oracle From Web Apps

    Sumit Siddharth
    Fri, 17:00 - 17:50
    Royale 1 - Track 2
  • Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection

    Wayne Huang
    Fri, 18:00 - 18:50
    Royale 1 - Track 2
  • Hacking and Protecting Oracle Database Vault

    Esteban Martínez Fayó
    Fri, 19:00 - 19:50
    Royale 1 - Track 2
  • Podcaster's Meetup

     
    Fri, 21:00 - 22:00
    Royale 1
  • Saturday, July 31
  • Exploiting SCADA Systems

    Jeremy Brown
    Sat, 10:00 - 10:50
    Royale 1 - Track 2
  • Kim Jong-il and Me: How to Build a Cyber Army to Defeat the U.S.

    Charlie Miller
    Sat, 11:00 - 11:50
    Royale 1 - Track 2
  • Cyber[Crime|War] Charting Dangerous Waters

     
    Sat, 12:00 - 12:50
    Royale 1 - Track 2
  • The Power of Chinese Security

    Jake Appelbaum, Anthony Lai, Jon Oberheide
    Sat, 13:00 - 13:50
    Royale 1 - Track 2
  • Wardriving the Smart Grid: Practical Approaches to Attacking Utility Packet Radios

    Nathan Keltner, Shawn Moyer
    Sat, 14:00 - 14:50
    Royale 1 - Track 2
  • SCADA and ICS for Security Experts: How to Avoid Cyberdouchery

    James Arlen
    Sat, 15:00 - 15:50
    Royale 1 - Track 2
  • The Night The Lights Went Out In Vegas: Demystifying Smartmeter Networks

    Garret Picchioni, Barrett Weisshaar
    Sat, 16:00 - 16:50
    Royale 1 - Track 2
  • Cyberterrorism and the Security of the National Drinking Water Infrastructure

    John McNabb
    Sat, 17:00 - 17:50
    Royale 1 - Track 2
  • The Chinese Cyber Army - An Archaeological Study from 2001 to 2010

    Wayne Huang, Jack Yu
    Sat, 18:00 - 18:50
    Royale 1 - Track 2
  • An Examination of the Adequacy of the Laws Related to Cyber Warfare

    Dondi West
    Sat, 19:00 - 19:50
    Royale 1 - Track 2
  • Industrial Cyber Security

    Paul Malkewicz, J. Novak, Wade Polk
    Sat, 20:00 - 20:50
    Royale 1 - Track 2
  • Sunday, August 1
  • Multiplayer Metasploit: Tag-Team Penetration and Information Gathering

    Ryan Linn
    Sun, 10:00 - 10:50
    Royale 1 - Track 2
  • Balancing the Pwn Trade Deficit

    Colin Ames, Anthony Lai, Val Smith
    Sun, 11:00 - 11:50
    Royale 1 - Track 2
  • Powershell...omfg

    Joshua Kelley, David Kennedy
    Sun, 12:00 - 12:50
    Royale 1 - Track 2
  • Build Your Own Security Operations Center for Little or No Money

    Josh Pyorre
    Sun, 13:00 - 13:50
    Royale 1 - Track 2
  • Seccubus - Analyzing vulnerability assessment data the easy way...

    Frank Breedijk
    Sun, 14:00 - 14:50
    Royale 1 - Track 2
  • Toolsmithing an IDA Bridge, Case Study For Building A Reverse Engineering Tool"

    Adam Pridgen
    Sun, 15:00 - 15:50
    Royale 1 - Track 2
  • You Spent All That Money And You Still Got Owned...

    Joseph McCray
    Sun, 16:00 - 16:50
    Royale 1 - Track 2
  • SHODAN for Penetration Testers

    Michael Schearer
    Sun, 17:00 - 17:50
    Royale 1 - Track 2