TrackROOM |
Track 1Track 1 |
Track 2Track 2 |
Track 3Track 3 |
Track 4Track 4 |
Track 5Track 5 |
1045 |
The M2M Risk Assessment Guide, A Cyber Fast Track Project
Don A. Bailey |
The Deputies are Still Confused
Rich Lundeen |
Practical Attacks Against MDM Solutions
Daniel Brodie + Michael Shaulov |
Powershell For Penetration Testers
Nikhil Mittal |
Vehicle Networks
Robert Leale |
TrackROOM |
Track 1Track 1 |
Track 2Track 2 |
Track 3Track 3 |
Track 4Track 4 |
Track 5Track 5 |
1215 |
Hacking Appliances: Ironic Exploitation of Security Products
Ben Williams |
Practical Exploitation Using A Malicious Service Set Identifier (SSID)
Deral Heiland |
Let's Play - Applanting
Ajit Hatti |
Powershell For Penetration Testers
Nikhil Mittal |
Vehicle Networks
Robert Leale |
TrackROOM |
Track 1Track 1 |
Track 2Track 2 |
Track 3Track 3 |
Track 4Track 4 |
Track 5Track 5 |
1430 |
Building a Defensive Framework for Medical Device Security
Jay Radcliffe |
XML out-of-band data retrieval
Alexey Osipov + Timur Yunusov |
Hardening Windows 8 Apps for the Windows Store
Bill Sempf |
Powershell For Penetration Testers
Nikhil Mittal |
Vehicle Networks
Robert Leale |
TrackROOM |
Track 1Track 1 |
Track 2Track 2 |
Track 3Track 3 |
Track 4Track 4 |
Track 5Track 5 |
1545 |
Huawei - From China With Love
Nikita Tarakanov + Oleg Kupreev |
A Perfect CRIME? Only TIME Will Tell
Tal Be'ery + Amichai Shulman |
Off Grid Communications With Android- Meshing The Mobile World
Josh Thomas + Jeff Robble |
Application Development Secure Coding Workshop
Jim Manico |
Vehicle Networks
Robert Leale |
TrackROOM |
Track 1Track 1 |
Track 2Track 2 |
Track 3Track 3 |
Track 4Track 4 |
Track 5Track 5 |
1700 |
To Dock or Not to Dock, That is The Question: Using Laptop Docking Stations As Hardware-based Attack Platforms
Andy Davis |
Invisibility Purge – Unmasking the Dormant Events of Invisible Web Controls – Advanced Hacking Methods for Asp.Net, Mono and RIA
Shay Chen |
Floating Car Data from Smartphones: What Google and Waze Know About You and How Hackers Can Control Traffic
Tobias Jeske |
Application Development Secure Coding Workshop
Jim Manico |
Vehicle Networks
Robert Leale |