• Friday, August 5
  • Balancing The Pwn Trade Deficit – APT Secrets in Asia

    Jeremy Chiu, Anthony Lai, Peikan, Benson Wu
    Fri, 10:00 - 11:50
    Track 3 - Track 3
  • Sneaky PDF

    Mahmud Ab Rahman
    Fri, 12:00 - 12:50
    Track 3 - Track 3
  • Three Generations of DoS Attacks

    Sam Bowne
    Fri, 13:00 - 13:50
    Track 3 - Track 3
  • Jugaad – Linux Thread Injection Kit

    Aseem Jakhar
    Fri, 14:00 - 14:50
    Track 3 - Track 3
  • Runtime Process Insemination

    Shawn Webb
    Fri, 15:00 - 15:50
    Track 3 - Track 3
  • Familiarity Breeds Contempt

    Sandy Clark, Brad Haines
    Fri, 16:00 - 16:50
    Track 3 - Track 3
  • UPnP Mapping

    Daniel Garcia
    Fri, 17:00 - 17:20
    Track 3 - Track 3
  • Kernel Exploitation Via Uninitialized Stack

    Kees Cook
    Fri, 17:30 - 17:50
    Track 3 - Track 3
  • Owned Over Amateur Radio: Remote Kernel Exploitation in 2011

    Dan Rosenberg
    Fri, 18:00 - 18:50
    Track 3 - Track 3
  • Saturday, August 6
  • Assessing Civilian Willingness to Participate in On-Line Political and Social Conflict

    Dr. Thomas J. Holt, Max Kilger
    Sat, 10:00 - 10:50
    Track 3 - Track 3
  • Traps of Gold

    Michael Brooks, Andrew Wilson
    Sat, 11:00 - 11:50
    Track 3 - Track 3
  • Hacking Google Chrome OS

    Matt Johansen, Kyle Osborne
    Sat, 12:00 - 12:50
    Track 3 - Track 3
  • Federation and Empire

    Emmanuel Bouillon
    Sat, 12:00 - 12:50
    Track 2 - Track 3
  • Hacking .Net Applications: The Black Arts

    Jon McCoy
    Sat, 13:00 - 13:50
    Track 3 - Track 3
  • Get Off of My Cloud: Cloud Credential Compromise and Exposure

    Ben Feinstein, Jeff Jarmoc
    Sat, 14:00 - 14:50
    Track 3 - Track 3
  • Metasploit vSploit Modules

    Marcus J. Carey, David Rude, Will Vandevanter
    Sat, 15:00 - 15:50
    Track 3 - Track 3
  • Sounds Like Botnet

    Iftach Ian Amit, Itzik Kotler
    Sat, 16:00 - 16:50
    Track 3 - Track 3
  • VoIP Hopping the Hotel: Attacking the Crown Jewels through VoIP

    Jason Ostrom
    Sat, 17:00 - 17:50
    Track 3 - Track 3
  • Fingerbank - Open DHCP Fingerprints Database

    Oliver Bilodeau
    Sat, 18:00 - 18:20
    Track 3 - Track 3
  • Pillaging DVCS Repos For Fun And Profit

    Adam Baldwin
    Sat, 18:30 - 18:50
    Track 3 - Track 3
  • This is REALLY not the droid you're looking for...

    Nicholas J. Percoco, Sean Schulte
    Sat, 19:00 - 19:50
    Track 3 - Track 3
  • Sunday, August 7
  • Cellular Privacy: A Forensic Analysis of Android Network Traffic

    Eric Fulton
    Sun, 10:00 - 10:50
    Track 3 - Track 3
  • Seven Ways to Hang Yourself with Google Android

    Erika Chin, Yekaterina Tsipenyuk O'Neil
    Sun, 11:00 - 11:50
    Track 3 - Track 3
  • Getting SSLizzard

    Paul Kehrer, Nicholas J. Percoco
    Sun, 12:00 - 12:50
    Track 3 - Track 3
  • Mobile App Moolah: Profit taking with Mobile Malware

    Jimmy Shah
    Sun, 13:00 - 13:50
    Track 3 - Track 3
  • Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin

    Skunkworks
    Sun, 14:00 - 14:20
    Track 3 - Track 3
  • Beat to 1337: Creating A Successful University Cyber Defense Organization

    Mike Arpaia, Ted Reed
    Sun, 14:30 - 14:50
    Track 3 - Track 3
  • Deceptive Hacking: How Misdirection Can Be Used To Steal Information Without Being Detected

    Bruce Barnett
    Sun, 15:00 - 15:50
    Track 3 - Track 3
  • Introduction to Tamper Evident Devices

    datagram
    Sun, 16:00 - 16:50
    Track 3 - Track 3
  • Hacking MMORPGs for Fun and Mostly Profit

    Josh Phillips
    Sun, 17:00 - 17:50
    Track 3 - Track 3
  • Steal Everything, Kill Everyone, Cause Total Financial Ruin!

    Jayson E. Street
    Sun, 18:00 - 18:50
    Track 3 - Track 3