Registration - Saturday
Phishing Statistics and Intuitive Enumeration of Hosts and Roles
Exploring Novel Ways in Building Botnets
Radio Reconnaissance in Penetration Testing - All Your RF Are Belong to Us
Building an All-Channel Bluetooth Monitor
Pulling a John Connor: Defeating Android
Fail 2.0: Further Musings on Attacking Social Networks
Next Generation Wireless Recon, Visualizing the Airwaves
Hack the Genome! The Age of Bimolecular Cryptology
Stranger in a Strange Land: Reflections on a Linux Guy's First Year at Microsoft
Man in the Middling Everything with The Middler
Blinded by Flash: Widespread Security Risks Flash Developers Don't See
They Took My Laptop! U.S. Search and Seizure Explained
Building Wireless Sensor Hardware and Software
802.11 ObgYn or "Spread Your Spectrum"
The Gentlemen's Agreement: Pwning Friends Legally for Fun, ????, and Profit
Off the Shelf Security Meeting Crime with an Open Mind
All Your Packets are Belong To Us: Attacking Backbone Technologies
Security vs. Usability: False Paradigms of Lazyness
The OWASP AntiSamy Project
The Fast-Track Suite: Advanced Penetration Techniques Made Easy
Storming the Ivy Tower: How to Hack Your Way into Academia
Hack or Halo
Saturday Night Party