?
0wn the Con
3D Modeling and Visualization of Real Time Security Events
An Evite from Surbo? Probably an invitation for trouble.
A Paranoid Schizophrenia-based Model of Data Security
Are you receiving me? Recent issues in wifi privacy
Attacking 3G and 4G mobile telecommunications networks
Closing Remarks
Computer Search and Seizure
Defeating mTANs for profit
Defending against Targeted attacks using Duck tape, Popsicle Sticks and Legos
Exploiting the Hard-Working DWARF
Fire Talks
Fire Talks
Fun with Flow
Gone in 60 Minutes: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP
Hacking "Smartwater" Wireless Water Networks
Hacking the Business Capability Stack: Make Corporate Bureaucracy Work for You
Half Baked: Hardware Hacking Mixed with Sweet Software Reverse Engineering
Hard Drive Paperweight: Recovery from a Seized Motor!
Hop Hacking Hedy
Inside the App: All Your Data are Belong to Me
INTERSECT: Combining Commercial/FOSS Tools with Custom Code to Root Out Malware
Keynote - Analytic Framework for Cyber Security
Malicious USB Devices:Is that an attack vector in your pocket or are you just happy to see me?
Opening Remarks
Printers Gone Wild!
Printer to PWND: Leveraging Multifunction Printers During Penetration Testing
Project Ubertooth: Building a Better Bluetooth Adapter
Reverse Engineering Using the Android Emulator
ShmooCon Labs Goes To College
TEAM JOCH vs. Android: The Ultimate Showdown
The Getaway: Methods and Defenses for Data Exfiltration
The Past, Present, and Future of "Something You Know"
Tracking Flaws – Stream Reassembly Issues in Snort IPS
Transparent Botnet Control for Smartphones Over SMS
Unlocking the Toolkit: Attacking Google Web Toolkit Applications
URL Enlargement: Is it for You?
USB Autorun attacks against Linux
Visual Malware Reversing: How to Stop Reading Assembly and Love the Code
Yet Another Heapspray Detector
ZigBee Security: Find, Fix, Finish