Registration
Half Baked: Hardware Hacking Mixed with Sweet Software Reverse Engineering
URL Enlargement: Is it for You?
USB Autorun attacks against Linux
Visual Malware Reversing: How to Stop Reading Assembly and Love the Code
Malicious USB Devices:Is that an attack vector in your pocket or are you just happy to see me?
Hacking the Business Capability Stack: Make Corporate Bureaucracy Work for You
0wn the Con
Transparent Botnet Control for Smartphones Over SMS
Inside the App: All Your Data are Belong to Me
The Past, Present, and Future of "Something You Know"
Closing Remarks