• ?
  • ?

    Johnny Long
    Fri, 17:00 - 17:30
    Build It room - One Track Mind
  • 0
  • 0wn the Con

    Bruce Potter
    Sun, 12:00 - 13:00
    Build It room - Build It!
  • 3
  • 3D Modeling and Visualization of Real Time Security Events

    Dan Klinedinst
    Sat, 17:00 - 18:00
    Build It room - Build It!
  • A
  • An Evite from Surbo? Probably an invitation for trouble.

    Trent Lo
    Sat, 15:00 - 16:00
    Bring It On room - Bring It On!
  • A Paranoid Schizophrenia-based Model of Data Security

    Marsh Ray
    Fri, 15:30 - 16:00
    Build It room - One Track Mind
  • Are you receiving me? Recent issues in wifi privacy

    Tara Whalen
    Fri, 18:00 - 18:30
    Build It room - One Track Mind
  • Attacking 3G and 4G mobile telecommunications networks

    Daniel Mende, Enno Rey
    Sat, 15:00 - 16:00
    Break It room - Break It!
  • C
  • Closing Remarks

    Bruce Potter
    Sun, 14:00 - 15:00
    Build It room
  • Computer Search and Seizure

    Marcia Hofmann
    Sat, 10:00 - 11:00
    Bring It On room - Bring It On!
  • D
  • Defeating mTANs for profit

    Axelle Apvrille, Kyle Yang
    Sat, 16:00 - 17:00
    Break It room - Break It!
  • Defending against Targeted attacks using Duck tape, Popsicle Sticks and Legos

    Richard Rushing
    Sat, 10:00 - 11:00
    Build It room - Build It!
  • E
  • Exploiting the Hard-Working DWARF

    Sergey Bratus, James Oakley
    Sat, 14:00 - 15:00
    Build It room - Build It!
  • F
  • Fire Talks

     
    Sat, 20:00 - 21:00
    Bring It On room
  • Fire Talks

     
    Fri, 20:00 - 21:00
    Bring It On room
  • Fun with Flow

    Richard Friedberg
    Sat, 11:00 - 12:00
    Build It room - Build It!
  • G
  • Gone in 60 Minutes: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP

    Andrew Gavin
    Fri, 16:30 - 17:00
    Build It room - One Track Mind
  • H
  • Hacking "Smartwater" Wireless Water Networks

    John McNabb
    Fri, 16:00 - 16:30
    Build It room - One Track Mind
  • Hacking the Business Capability Stack: Make Corporate Bureaucracy Work for You

    Javier Gonzales Sanchez
    Sun, 11:00 - 12:00
    Bring It On room - Bring It On!
  • Half Baked: Hardware Hacking Mixed with Sweet Software Reverse Engineering

    Marc Eisenbarth
    Sun, 10:00 - 11:00
    Build It room - Build It!
  • Hard Drive Paperweight: Recovery from a Seized Motor!

    Scott Moulton
    Sat, 12:00 - 13:00
    Bring It On room - Bring It On!
  • Hop Hacking Hedy

    Atlas, Q, Cutaway Smash, Slugs on Toast
    Sat, 12:00 - 13:00
    Break It room - Break It!
  • I
  • Inside the App: All Your Data are Belong to Me

    Sarah Edwards
    Sun, 12:00 - 13:00
    Bring It On room - Bring It On!
  • INTERSECT: Combining Commercial/FOSS Tools with Custom Code to Root Out Malware

    Fotios Lindiakos, Matthew Pawloski
    Sat, 15:00 - 16:00
    Build It room - Build It!
  • K
  • Keynote - Analytic Framework for Cyber Security

    Peiter Zatko
    Fri, 18:30 - 19:30
    Build It room - One Track Mind
  • M
  • Malicious USB Devices:Is that an attack vector in your pocket or are you just happy to see me?

    Adrian Crenshaw
    Sun, 11:00 - 12:00
    Break It room - Break It!
  • O
  • Opening Remarks

    Bruce Potter
    Fri, 15:00 - 15:30
    Build It room - One Track Mind
  • P
  • Printers Gone Wild!

    Ben Smith
    Sat, 14:00 - 15:00
    Break It room - Break It!
  • Printer to PWND: Leveraging Multifunction Printers During Penetration Testing

    Pete Arzamendi, Deral Heiland
    Sat, 10:00 - 11:00
    Break It room - Break It!
  • Project Ubertooth: Building a Better Bluetooth Adapter

    Michael Ossmann
    Sat, 16:00 - 17:00
    Build It room - Build It!
  • R
  • Reverse Engineering Using the Android Emulator

    Scott Dunlop
    Sat, 17:00 - 18:00
    Break It room - Break It!
  • S
  • ShmooCon Labs Goes To College

    G. W. Ray Davidson III, PhD
    Sat, 16:00 - 17:00
    Bring It On room - Bring It On!
  • T
  • TEAM JOCH vs. Android: The Ultimate Showdown

    Zach Lanier, Jon Oberheide
    Sat, 11:00 - 12:00
    Break It room - Break It!
  • The Getaway: Methods and Defenses for Data Exfiltration

    Sean V. Coyne
    Sat, 17:00 - 18:00
    Bring It On room - Bring It On!
  • The Past, Present, and Future of "Something You Know"

    Martin Bos, Robert Imhoff-Dousharm, Rick Redman, David Schuetz
    Sun, 13:30 - 14:00
    Build It room
  • Tracking Flaws – Stream Reassembly Issues in Snort IPS

    Ashley Thomas
    Sat, 14:00 - 15:00
    Bring It On room - Bring It On!
  • Transparent Botnet Control for Smartphones Over SMS

    Georgia Weidman
    Sun, 12:00 - 13:00
    Break It room - Break It!
  • U
  • Unlocking the Toolkit: Attacking Google Web Toolkit Applications

    Ron Gutierrez
    Sat, 11:00 - 12:00
    Bring It On room - Bring It On!
  • URL Enlargement: Is it for You?

    Dan Crowley
    Sun, 10:00 - 11:00
    Break It room - Break It!
  • USB Autorun attacks against Linux

    Jon Larimer
    Sun, 10:00 - 11:00
    Bring It On room - Bring It On!
  • V
  • Visual Malware Reversing: How to Stop Reading Assembly and Love the Code

    Danny Quist
    Sun, 11:00 - 12:00
    Build It room - Build It!
  • Y
  • Yet Another Heapspray Detector

    Daniel Kovach
    Sat, 12:00 - 13:00
    Build It room - Build It!
  • Z
  • ZigBee Security: Find, Fix, Finish

    Ricky Melgares, Ryan Speers
    Fri, 17:30 - 18:00
    Build It room - One Track Mind