Wednesday 17th
Time | Presentation | Speaker | ||
---|---|---|---|---|
9:00AM |
Radium - Automating Data Collection & Visualization in the Next Generation of Maltego |
Roelof Temmingh |
||
10:10AM |
Morning Tea |
|||
10:30AM |
Hacking Humans |
Barnaby Jack |
||
11:30AM |
iOS6 Security |
Mark Dowd & Tarjei Mandt |
||
12:30PM |
Lunch |
|||
1:30PM |
Modeling the Exploitation & Mitigation of Memory Safety Vulnerabilites |
Matt Miller |
||
2:30PM |
Tackling the Android Challenge |
Joshua Drake |
||
3:30PM |
Afternoon Tea |
|||
3:45PM |
Detecting Bugs Using Decompilation and Dataflow Analysis |
Silvio Cesare |
||
4:45PM |
Rootkit in your Laptop: Hidden Code in your Chipset |
Igor Skochinsky |
||
7:00PM |
Party |
Thursday 18th
Time | Presentation | Speaker | ||
---|---|---|---|---|
9:00AM |
Android Forensic Deep Dive |
Bradley Schatz |
||
10:10AM |
Morning Tea |
|||
10:30AM |
Unravelling Windows 8 Security and the ARM Kernel |
Alex Ionescu |
||
11:30AM |
The Case for Semantics-Based Methods in Reverse Engineering |
Rolf Rolles |
||
12:30PM |
Lunch |
|||
1:30PM |
Binary Instrumentation for Android |
Collin Mulliner |
||
2:30PM |
Emulating DFU to Quickly Reverse and Exploit USB Devices |
Travis Goodspeed |
||
3:30PM |
Afternoon Tea |
|||
3:45PM |
Maverick: Adding the Apple Touch to Qualcomm's Baseband Bootrom |
Eric MacDonald |
||
4:45PM |
Advanced Exploitation of Mobile/Embedded Devices:the ARM Microprocessor |
Stephen Ridley & Stephen Lawler |