TrackROOM |
Track 1Track 1 |
Track 2Track 2 |
Track 3Track 3 |
Track 4Track 4 |
1000 |
Honeypot That Can Bite: Reverse Penetration
Alexey Sintsov |
The Sandbox Roulette - Are You Ready for The Gamble?
Rafal Wojtczuk + Rahul Kashyap |
Hacking Video Conferencing Systems
Moritz Jodeit |
Assessing BYOD with the Smartphone Pentest Framework
Georgia Weidman |
TrackROOM |
Track 1Track 1 |
Track 2Track 2 |
Track 3Track 3 |
Track 4Track 4 |
1130 |
Who's Really Attacking Your ICS Devices?
Kyle Wilhoit |
Next Generation Mobile Rootkits
Thomas Roth |
Power Analysis Attacks for Cheapskates
Colin O'Flynn |
Assessing BYOD with the Smartphone Pentest Framework
Georgia Weidman |
TrackROOM |
Track 1Track 1 |
Track 2Track 2 |
Track 3Track 3 |
Track 4Track 4 |
1400 |
Harnessing GP²Us - Building Better Browser Based Botnets
Marc Blanchou |
Advanced Heap Manipulation in Windows 8
Zhenhua 'Eric' Liu |
Using D-Space to Open Doors
Brad Antoniewicz |
Advanced iOS Application Pentesting
Vivek Ramachandran |
TrackROOM |
Track 1Track 1 |
Track 2Track 2 |
Track 3Track 3 |
Track 4Track 4 |
1530 |
Multiplayer Online Games Insecurity
Donato Ferrante + Luigi Auriemma |
OptiSig: Semantic Signature for Metamorphic Malware
Nguyen Anh Quynh |
Dude, Where’s My Laptop?
Simon Roses Femerling + Curro Marquez |
Advanced iOS Application Pentesting
Vivek Ramachandran |
TrackROOM |
Track 1Track 1 |
Track 2Track 2 |
Track 3Track 3 |
Track 4Track 4 |
1700 |
DropSmack: How Cloud Synchronization Services Render Your Corporate Firewall Worthless
Jacob Williams |
Hybrid Defense: How to Protect Yourself From Polymorphic 0-days
Svetlana Gaivoronski + Dennis Gamayunov |
Mesh Stalkings: Penetration Testing with Small Networked Devices
Phil Polstra |
Advanced iOS Application Pentesting
Vivek Ramachandran |