Wednesday 17th
| Time | Presentation | Speaker | ||
|---|---|---|---|---|
|
9:00AM |
Radium - Automating Data Collection & Visualization in the Next Generation of Maltego |
|
Roelof Temmingh |
|
|
10:10AM |
Morning Tea |
|||
|
10:30AM |
Hacking Humans |
|
Barnaby Jack |
|
|
11:30AM |
iOS6 Security |
|
Mark Dowd & Tarjei Mandt |
|
|
12:30PM |
Lunch |
|||
|
1:30PM |
Modeling the Exploitation & Mitigation of Memory Safety Vulnerabilites |
|
Matt Miller |
|
|
2:30PM |
Tackling the Android Challenge |
|
Joshua Drake |
|
|
3:30PM |
Afternoon Tea |
|||
|
3:45PM |
Detecting Bugs Using Decompilation and Dataflow Analysis |
|
Silvio Cesare |
|
|
4:45PM |
Rootkit in your Laptop: Hidden Code in your Chipset |
|
Igor Skochinsky |
|
|
7:00PM |
Party |
Thursday 18th
| Time | Presentation | Speaker | ||
|---|---|---|---|---|
|
9:00AM |
Android Forensic Deep Dive |
|
Bradley Schatz |
|
|
10:10AM |
Morning Tea |
|||
|
10:30AM |
Unravelling Windows 8 Security and the ARM Kernel |
|
Alex Ionescu |
|
|
11:30AM |
The Case for Semantics-Based Methods in Reverse Engineering |
|
Rolf Rolles |
|
|
12:30PM |
Lunch |
|||
|
1:30PM |
Binary Instrumentation for Android |
|
Collin Mulliner |
|
|
2:30PM |
Emulating DFU to Quickly Reverse and Exploit USB Devices |
|
Travis Goodspeed |
|
|
3:30PM |
Afternoon Tea |
|||
|
3:45PM |
Maverick: Adding the Apple Touch to Qualcomm's Baseband Bootrom |
|
Eric MacDonald |
|
|
4:45PM |
Advanced Exploitation of Mobile/Embedded Devices:the ARM Microprocessor |
|
Stephen Ridley & Stephen Lawler |
|