• Saturday, October 1
  • Throw It in the River? Towards Real Live Actual Smartphone Security

    Georgia Weidman
    Sat, 09:00 - 09:50
    Track 3
  • Pentesting over Powerlines

    Rob Simon
    Sat, 10:00 - 10:50
    Track 3
  • You are the Smart Meter: Making (and hacking) of the 2011 MA-CCDC electronic badges

    Larry Pesce
    Sat, 11:00 - 11:50
    Track 3
  • Is locksport a sport?

    Bill Sempf
    Sat, 12:00 - 12:50
    Track 3
  • Virtual trust, Virtual Permission and the Illusion of Security

    infojanitor
    Sat, 13:00 - 13:50
    Track 3
  • Get Off of My Cloud: Cloud Credential Compromise and Exposure

    Ben Feinstein, Jeff Jarmoc
    Sat, 14:00 - 14:50
    Track 3
  • Mobile App Moolah: Profit taking with Mobile Malware

    Jimmy Shah
    Sat, 15:00 - 15:50
    Track 3
  • 100 bugs in 100 days: An analysis of ICS (SCADA) software

    Terry McCorkle, Billy Rios
    Sat, 16:00 - 16:50
    Track 3
  • Open source firewalling with pfSense

    Chris Buechler, Scott Ullrich
    Sat, 17:00 - 17:50
    Track 3
  • How I learned to roll my own: Building custom pen testing platforms on the fly

    Spiky Geek
    Sat, 18:00 - 18:50
    Track 3
  • Sunday, October 2
  • A Tribute to Dr. Strangelove

    Chris Roberts
    Sun, 09:00 - 09:50
    Track 3
  • The Hidden XSS – Attacking the Desktop

    Kyle Osborne
    Sun, 10:00 - 10:50
    Track 3
  • Blue team is sexy — refocusing on defense — Part II — All you baseline are belong to us

    Mick Douglas
    Sun, 11:00 - 11:50
    Track 3
  • Why InfoSec Practitioners Are Failing

    James Arlen
    Sun, 12:00 - 12:50
    Track 3
  • OpenWIPS-ng

    Thomas d'Otreppe
    Sun, 13:00 - 13:50
    Track 3
  • Exploiting Java Memory Corruption Vulnerabilities

    Joshua Drake
    Sun, 14:00 - 14:50
    Track 3