0wn the Con
A Tale of Infrastructural Weaknesses in Distributed Wireless Communication Services
Back to the Glass House
BaSO4: A Dynamic Dataflow Analysis Tool for Auditing and Reversing
Becoming Jack Flack: Real Life Cloak & Dagger
Better Approaches to Physical Tamper Detection
Blackberry Mobile Spyware - The Monkey Steals the Berries
Bluetooth Keyboards: Who Owns Your Keystrokes?
Build your own Predator UAV @ 99.95% Discount
Closing Remarks
Cracking the Foundation: Attacking WCF Web Services
Cyborg Information Security: Defense Against the Dark Arts
De Gustibus - Adventures in Hacking Taste
Detection of rogue access points using clock skews: does it really work?
DIY Hard Drive Diagnostics: Understanding a Broken Drive
Economics of Cyber Crime
Exposed | More: Attacking the Extended Web
Flying Instruments-Only: Legal and Privacy Issues in Cloud Computing
GPU vs. CPU Supercomputing Security Shootout
GSM: SRSLY?
Guest Stealing...The VMware Way
honeyM: A Framework For Virtual Mobile Device Honeyclients
How To Be An RSol: Effective Bug Hunting in Solaris
Information disclosure via P2P networks: Why stealing an identity via Gnutella is like clubbing baby seals
Jsunpack-network Edition Release: JavaScript Decoding and Intrusion Detection
Keynote - Closing the TLS Authentication Gap
Learning by Breaking: A New Project for Insecure Web Applications
Opening Remarks
PCI: An Existential Threat To Security As We Know It
Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications
Recovering Evidentiary Artifacts from Virtual Machines and Hypervisor Environments
Ring -1 vs. Ring -2: Containerizing Malicious SMM Interupt Handlers on AMD-V
Social Zombies II: Your Friends Need More Brains
Tales from the Crypto
The Friendly Traitor: Our Software Wants to Kill Us
The New World of Smartphone Security - What Your iPhone Disclosed About You
The Splendiferous Story of Archive Team and the Rapidly Disappearing Digital Heritage
WiFi Bombs shaken not stirred
Windows File Pseudonyms
WLCCP - Analysis of a Potentially Flawed Protocol