• Wednesday, July 25
  • CHANGING THE SECURITY PARADIGM....TAKING BACK YOUR NETWORK AND BRINGING PAIN TO THE ADVERSARY

    Shawn Henry
    Wed, 09:00 - 10:00
    Augustus I+II
  • GOOGLE NATIVE CLIENT - ANALYSIS OF A SECURE BROWSER PLUGIN SANDBOX

    Chris Rohlf
    Wed, 11:45 - 12:45
    Augustus I+II - Upper Layers
  • MODSECURITY AS UNIVERSAL CROSS-PLATFORM WEB PROTECTION TOOL

    Ryan Barnett, Greg Wroblewski
    Wed, 14:15 - 14:35
    Augustus I+II - Upper Layers
  • LIBINJECTION: A C LIBRARY FOR SQLI DETECTION AND GENERATION THROUGH LEXICAL ANALYSIS OF REAL WORLD ATTACKS

    Nick Galbreath
    Wed, 14:55 - 15:15
    Augustus I+II - Upper Layers
  • PRNG: PWNING RANDOM NUMBER GENERATORS (IN PHP APPLICATIONS)

    George Argyros, Silvio Cesare
    Wed, 15:30 - 16:30
    Augustus I+II - Upper Layers
  • OWNING BAD GUYS {AND MAFIA} WITH JAVASCRIPT BOTNETS

    Chema Alonso
    Wed, 17:00 - 18:00
    Augustus I+II - Upper Layers
  • Thursday, July 26
  • AN INTERVIEW WITH NEAL STEPHENSON

    Neal Stephenson
    Thu, 09:00 - 10:00
    Augustus I+II
  • HTML5 TOP 10 THREATS – STEALTH ATTACKS AND SILENT EXPLOITS

    Shreeraj Shah
    Thu, 10:15 - 11:15
    Augustus I+II - Web Apps
  • AMF TESTING MADE EASY!

    Luca Carettoni
    Thu, 11:45 - 12:45
    Augustus I+II - Web Apps
  • HACKING WITH WEBSOCKETS

    Sergey Shekyan, Vaagn Toukharian
    Thu, 14:15 - 15:15
    Augustus I+II - Web Apps
  • BLENDED THREATS AND JAVASCRIPT: A PLAN FOR PERMANENT NETWORK COMPROMISE

    Josh Brashars, Phil Purviance
    Thu, 15:30 - 16:30
    Augustus I+II - Web Apps
  • STATE OF WEB EXPLOIT TOOLKITS

    Jason Jones
    Thu, 17:00 - 18:00
    Augustus I+II - Web Apps