day one /DC2010( FEB 2 )
0900 - 0950 | + keynote speaker: gregory schaffer, dhs // regency ballroom e+f | ||||
TRACK » | //Application Security |
//The Big Picture | //Hardware | LOCATION » | Ballroom Level Regency Ballroom C+D |
Ballroom Level Rgency Ballroom E |
Ballroom Level Regency Ballroom F |
0950 - 1000 | + break | ||||
1000 - 1115 |
Chema Alonso & Jose Palazon: Connnection String Parameter Pollution Attacks |
Andrew Fried, Ben Butler & Richard Cox: Whose Internet is it, Anyway? |
Christopher Tarnovsky: Deconstructing a 'Secure' Processor |
||
1115 - 1130 | + coffee service | ||||
1130 - 1245 |
Mike Bailey: Neat, New, and Ridiculous Flash Hacks |
Nicholas J. Percoco: Global Security Report 2010 |
Joe Grand: Hardware is the New Software |
||
1245 - 1345 | + lunch in independence center b | ||||
1345 - 1500 |
Christian Kendi: Enhancing ZFS |
Kevin Stevens: The Underground Economy of the Pay-Per-Install (PPI) Business |
Leonardo Nve: Playing in a Satellite Environment 1.2 |
||
1500 - 1515 | + break | ||||
1515 - 1630 |
David Litchfield: Hacking Oracle 11g |
William Shane Powell: Cyber Effects Prediction |
Joshua Marpet: Physical Security in a Networked World: Video Analytics, Video Surveillance, and You |
||
1630 - 1645 | + coffee service | ||||
1645 - 1800 |
Qing Wang: MS Office Document War: Parse Deeply, Fuzz Widely, Shoot Precisely and Measured Scientifically |
Joseph Menn: Hacking Russia: Inside an unprecedented prosecution of organized cybercrime |
Deviant Ollam: The Four Types of Locks |
||
1800 - 1930 |
+ reception
// independence hall |
day two /DC2010( FEB 3 )