Wednesday 17th
Time | Presentation | Speaker | ||
---|---|---|---|---|
9:00AM |
Radium - Automating Data Collection & Visualization in the Next Generation of Maltego |
![]() |
Roelof Temmingh |
![]() |
10:10AM |
Morning Tea |
|||
10:30AM |
Hacking Humans |
![]() |
Barnaby Jack |
![]() |
11:30AM |
iOS6 Security |
![]() |
Mark Dowd & Tarjei Mandt |
![]() |
12:30PM |
Lunch |
|||
1:30PM |
Modeling the Exploitation & Mitigation of Memory Safety Vulnerabilites |
![]() |
Matt Miller |
![]() |
2:30PM |
Tackling the Android Challenge |
![]() |
Joshua Drake |
![]() |
3:30PM |
Afternoon Tea |
|||
3:45PM |
Detecting Bugs Using Decompilation and Dataflow Analysis |
![]() |
Silvio Cesare |
![]() |
4:45PM |
Rootkit in your Laptop: Hidden Code in your Chipset |
![]() |
Igor Skochinsky |
![]() |
7:00PM |
Party |
Thursday 18th
Time | Presentation | Speaker | ||
---|---|---|---|---|
9:00AM |
Android Forensic Deep Dive |
![]() |
Bradley Schatz |
![]() |
10:10AM |
Morning Tea |
|||
10:30AM |
Unravelling Windows 8 Security and the ARM Kernel |
![]() |
Alex Ionescu |
![]() |
11:30AM |
The Case for Semantics-Based Methods in Reverse Engineering |
![]() |
Rolf Rolles |
![]() |
12:30PM |
Lunch |
|||
1:30PM |
Binary Instrumentation for Android |
![]() |
Collin Mulliner |
![]() |
2:30PM |
Emulating DFU to Quickly Reverse and Exploit USB Devices |
![]() |
Travis Goodspeed |
![]() |
3:30PM |
Afternoon Tea |
|||
3:45PM |
Maverick: Adding the Apple Touch to Qualcomm's Baseband Bootrom |
![]() |
Eric MacDonald |
![]() |
4:45PM |
Advanced Exploitation of Mobile/Embedded Devices:the ARM Microprocessor |
![]() |
Stephen Ridley & Stephen Lawler |
![]() |