• 0
  • 0wn the Con

     
    Sun, 12:00 - 13:00
    Back Room - Build It!
  • A
  • A Tale of Infrastructural Weaknesses in Distributed Wireless Communication Services

    Kingtuna
    Sat, 17:00 - 18:00
    Front Room - Break It!
  • B
  • Back to the Glass House

    Tyler Shields
    Sun, 11:00 - 12:00
    Wilson - Bring It On!
  • BaSO4: A Dynamic Dataflow Analysis Tool for Auditing and Reversing

    Zack Fasel
    Sat, 16:00 - 17:00
    Front Room - Break It!
  • Becoming Jack Flack: Real Life Cloak & Dagger

    Dan Crowley, Robin Wood
    Sun, 10:00 - 11:00
    Wilson - Bring It On!
  • Better Approaches to Physical Tamper Detection

    Karsten Nohl
    Sun, 13:30 - 14:00
    Back Room - Build It!
  • Blackberry Mobile Spyware - The Monkey Steals the Berries

    Vikram Phatak
    Sun, 10:00 - 11:00
    Back Room - Build It!
  • Bluetooth Keyboards: Who Owns Your Keystrokes?

    Edward Zaborowski
    Sat, 15:00 - 16:00
    Front Room - Break It!
  • Build your own Predator UAV @ 99.95% Discount

    Lisa Lorenzin
    Sat, 14:00 - 15:00
    Back Room - Build It!
  • C
  • Closing Remarks

    Gregory Fleischer
    Sun, 14:00 - 15:00
    Back Room
  • Cracking the Foundation: Attacking WCF Web Services

    N. Grunzweig
    Sun, 12:00 - 13:00
    Front Room - Break It!
  • Cyborg Information Security: Defense Against the Dark Arts

    Pete Markowsky, Justin Morehouse
    Sat, 15:00 - 16:00
    Wilson - Bring It On!
  • D
  • De Gustibus - Adventures in Hacking Taste

    Roy Ragsdale
    Sat, 14:00 - 15:00
    Wilson - Bring It On!
  • Detection of rogue access points using clock skews: does it really work?

    Adam Cecchetti, Richard Goldberg, Esteban Gutierrez
    Sat, 10:00 - 11:00
    Wilson - Bring It On!
  • DIY Hard Drive Diagnostics: Understanding a Broken Drive

    Rafael Dominguez Vega
    Sat, 17:00 - 18:00
    Back Room - Build It!
  • E
  • Economics of Cyber Crime

    Joshua Gourneau
    Fri, 17:00 - 17:30
    Back Room - One Track Mind
  • Exposed | More: Attacking the Extended Web

    Russ McRee
    Sun, 10:00 - 11:00
    Front Room - Break It!
  • F
  • Flying Instruments-Only: Legal and Privacy Issues in Cloud Computing

    Jim Manley
    Sat, 11:00 - 12:00
    Wilson - Bring It On!
  • G
  • GPU vs. CPU Supercomputing Security Shootout

    Eric M. Fiterman
    Fri, 16:00 - 16:30
    Back Room - One Track Mind
  • GSM: SRSLY?

    Dr. Thomas J. Holt, JJ (Jennifer Jabbusch)
    Sat, 12:00 - 13:00
    Front Room - Break It!
  • Guest Stealing...The VMware Way

    Mark Steward, Michael Weigand
    Fri, 18:30 - 19:00
    Back Room - One Track Mind
  • H
  • honeyM: A Framework For Virtual Mobile Device Honeyclients

    David Barnett, Andrew Hay, Michael Santarcangelo, Doug Wilson
    Sat, 16:00 - 17:00
    Back Room - Build It!
  • How To Be An RSol: Effective Bug Hunting in Solaris

    D. Brasefield
    Sat, 14:00 - 15:00
    Front Room - Break It!
  • I
  • Information disclosure via P2P networks: Why stealing an identity via Gnutella is like clubbing baby seals

    Marisa Fagan, Michael Ligh
    Fri, 16:30 - 17:00
    Back Room - One Track Mind
  • J
  • Jsunpack-network Edition Release: JavaScript Decoding and Intrusion Detection

    Sean Palka
    Sat, 10:00 - 11:00
    Back Room - Build It!
  • K
  • Keynote - Closing the TLS Authentication Gap

    Dr. Anton Chuvakin, Jack Daniel
    Fri, 19:00 - 20:00
    Back Room
  • L
  • Learning by Breaking: A New Project for Insecure Web Applications

    Gurdeep Kaur
    Fri, 18:00 - 18:30
    Back Room - One Track Mind
  • O
  • Opening Remarks

    Gregory Fleischer
    Fri, 15:00 - 16:00
    Back Room
  • P
  • PCI: An Existential Threat To Security As We Know It

    Trevor Hawthorn, Matt Hillman, Brian Holyfield, Mike Poor
    Sun, 11:00 - 12:00
    Back Room - Build It!
  • Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications

    Erin Jacobs
    Sun, 12:00 - 13:00
    Wilson - Bring It On!
  • R
  • Recovering Evidentiary Artifacts from Virtual Machines and Hypervisor Environments

    TheX1le
    Sat, 16:00 - 17:00
    Wilson - Bring It On!
  • Ring -1 vs. Ring -2: Containerizing Malicious SMM Interupt Handlers on AMD-V

    Michael Sutton
    Sat, 15:00 - 16:00
    Back Room - Build It!
  • S
  • Social Zombies II: Your Friends Need More Brains

    Colin Ames, Rick Farina, Jon S. Warner
    Sat, 11:00 - 12:00
    Front Room - Break It!
  • T
  • Tales from the Crypto

    Prajakta Jagdale
    Sat, 12:00 - 13:00
    Wilson - Bring It On!
  • The Friendly Traitor: Our Software Wants to Kill Us

    Colin Ames, T. OConnor
    Sun, 11:00 - 12:00
    Front Room - Break It!
  • The New World of Smartphone Security - What Your iPhone Disclosed About You

    K. Navas
    Sat, 10:00 - 11:00
    Front Room - Break It!
  • The Splendiferous Story of Archive Team and the Rapidly Disappearing Digital Heritage

    "Anonymous secondary speaker"
    Sat, 17:00 - 18:00
    Wilson - Bring It On!
  • W
  • WiFi Bombs shaken not stirred

    Enno Rey, Oliver Roeschke
    Sat, 12:00 - 13:00
    Back Room - Build It!
  • Windows File Pseudonyms

    Roger G. Johnston
    Fri, 17:30 - 18:00
    Back Room - One Track Mind
  • WLCCP - Analysis of a Potentially Flawed Protocol

    Will Gragido, John Pirc
    Sat, 11:00 - 12:00
    Back Room - Build It!