• 09:00
  • Mining Sensitive Information From Images Using Command-Line OCR

    Dennis Kuntz
    Sat, 09:00 - 09:50
    Track 1
  • Walking the Green Mile: How to Get Fired After a Security Incident

    Brian Baskin
    Sat, 09:00 - 09:50
    Track 2
  • Throw It in the River? Towards Real Live Actual Smartphone Security

    Georgia Weidman
    Sat, 09:00 - 09:50
    Track 3
  • 10:00
  • Beat to 1337: Creating A Successful University Cyber Defense Organization

    Mike Arpaia
    Sat, 10:00 - 10:50
    Track 1
  • Rule 1: Cardio (and 9 other rules to keep intruders out)

    Joe Schorr
    Sat, 10:00 - 10:50
    Track 2
  • Pentesting over Powerlines

    Rob Simon
    Sat, 10:00 - 10:50
    Track 3
  • 11:00
  • Tactical Post Exploitation

    Carlos Perez
    Sat, 11:00 - 11:50
    Track 1
  • Exploiting PKI for Fun & Profit or The Next Yellow Padlock Icon?

    Thomas Hoffecker
    Sat, 11:00 - 11:50
    Track 2
  • You are the Smart Meter: Making (and hacking) of the 2011 MA-CCDC electronic badges

    Larry Pesce
    Sat, 11:00 - 11:50
    Track 3
  • 12:00
  • Offensive Countermeasures: Still trying to bring sexy back

    Paul Asadoorian, John Strand
    Sat, 12:00 - 12:50
    Track 1
  • 73o7\/\/@\/\/Ki – Survival Hacking your way out of Armageddon

    Matthew Becker
    Sat, 12:00 - 12:50
    Track 2
  • Is locksport a sport?

    Bill Sempf
    Sat, 12:00 - 12:50
    Track 3
  • 13:00
  • When Fuzzers Miss: The no Hanging Fruit.

    Tony Huffman
    Sat, 13:00 - 13:50
    Track 1
  • Avoiding the Landmines in your own Backyard

    Bart Hopper
    Sat, 13:00 - 13:50
    Track 2
  • Virtual trust, Virtual Permission and the Illusion of Security

    infojanitor
    Sat, 13:00 - 13:50
    Track 3
  • 14:00
  • You’re Going to Need a Bigger Shovel – A Critical Look at Software Security Assurance

    Rafal Los
    Sat, 14:00 - 14:50
    Track 1
  • The Dirty Little Secrets They Didn’t Teach You In Pentesting Class

    Rob Fuller, Chris Gates
    Sat, 14:00 - 14:50
    Track 2
  • Get Off of My Cloud: Cloud Credential Compromise and Exposure

    Ben Feinstein, Jeff Jarmoc
    Sat, 14:00 - 14:50
    Track 3
  • 15:00
  • OSINT Beyond the Basics

    Rick Hayes, Karthik Rangarajan
    Sat, 15:00 - 15:50
    Track 1
  • Your perimeter sucks

    Boris Sverdlik
    Sat, 15:00 - 15:50
    Track 2
  • Mobile App Moolah: Profit taking with Mobile Malware

    Jimmy Shah
    Sat, 15:00 - 15:50
    Track 3
  • 16:00
  • Anti-Forensics for the Louise

    int0x80
    Sat, 16:00 - 16:50
    Track 1
  • Hide yo kids, hide yo wife: Residential security and monitoring the bottom line

    Evan Booth
    Sat, 16:00 - 16:50
    Track 2
  • 100 bugs in 100 days: An analysis of ICS (SCADA) software

    Terry McCorkle, Billy Rios
    Sat, 16:00 - 16:50
    Track 3
  • 17:00
  • Tomorrow you can patch that 0day – but your users will still get you p0wn3d

    Rick Redman
    Sat, 17:00 - 17:50
    Track 1
  • Free Floating Hostility

    Rick Farina
    Sat, 17:00 - 17:50
    Track 2
  • Open source firewalling with pfSense

    Chris Buechler, Scott Ullrich
    Sat, 17:00 - 17:50
    Track 3
  • 18:00
  • Covert Channels using IP Packet Headers

    Joff Thyer
    Sat, 18:00 - 18:50
    Track 1
  • Surviving a Teleporter Accident (It could happen to you)

    Jack Daniel
    Sat, 18:00 - 18:50
    Track 2
  • How I learned to roll my own: Building custom pen testing platforms on the fly

    Spiky Geek
    Sat, 18:00 - 18:50
    Track 3
  • 19:00
  • BioMining: Data Mining for (Neuro) hackers

    Magen Hughes
    Sat, 19:00 - 19:50
    Track 1
  • Building a Svartkast: Cheap hardware to leave behind on someone else’s network

    Adrian Crenshaw
    Sat, 19:00 - 19:50
    Track 2