07.30 |
REGISTRATION |
||
09.00 |
Keynote Address 1: The Art of Click-Jacking
|
||
10.00 |
Keynote Address 2: Cyberwar is Bullshit
|
||
11:00 |
COFFEE BREAK |
||
|
TRACK I |
TRACK II |
TRACK III |
11:30 |
Delivering Identity Management 2.0 by Leveraging OPSS
Thomas Varghese (Oracle Corporation)
|
Bluepilling the Xen Hypervisor
Alexander Tereshkin (Senior Researcher, Inivisble Things Labs) |
|
12:30 |
LUNCH BREAK |
||
13:15 |
Pass the Hash Toolkit for Windows
Hernan Ochoa (Senior Security Consultant, Core Security Technology) |
Internet Explorer 8 - Trustworthy Engineering and Browsing
Eric Lawrence (Security Program Manager, Microsoft Corporation)
|
|
14:15 |
Full Process Reconsitution from MemoryPeter Silberman (Engineer, Mandiant Inc.) |
Hacking Internet KiosksPaul Craig (Principal Security Consultant, Security-Assessment.com) |
Advanced Network Forensics Lab - PART 1
Meling Mudin [spoonfork] and Lee Chin Shing [geek00l] (Independent Network Security Researchers) |
15:15 |
Analysis and Visualization of Common PackersEro Carrera (Reverse Engineering Automation Engineer, zynamics GmbH) |
A Fox in the Hen House - UPnP IGD
Jonathan Squire (Founder, Information Security Group) |
Advanced Network Forensics Lab - PART 2
Meling Mudin [spoonfork] and Lee Chin Shing [geek00l] (Independent Network Security Researchers) |
16:15 |
COFFEE BREAK |
||
16:30 |
MoocherHunting: Real-Time Geo-Location of Moochers, Hackers and Unauthorized WiFi UsersJulian Ho (Chief Operating Officer, THINKSecure Pte. Ltd.) |
Browser Exploits: A New Model for Browser Security
Saumil Shah (Founder/CEO Net-Square Solutions) |
Advanced Lockpicking Lab - PART 1
Q, Deviant Olam and Eric Michaud (TOOOL USA) |
17:30 |
Mac OS XploitationDino Dai Zovi (Independent Network Security Researcher) |
Time for a Free Hardware Foundation?
Roberto Preatoni (Founder, Zone-H and WSLabi) |
Advanced Lockpicking Lab - PART 2
Q, Deviant Olam and Eric Michaud (TOOOL USA) |
18:30 |
Hacking a Bird in The Sky 2.0Jim Geovedi and Raditya Iryandi (Security Consultants at PT Bellua Asia Pacific) |
How the Leopard Hides His Spots - OS X Anti-Forensics Techniques
The Grugq (Independent Network Security Researcher) |
|
19:30 |
END |
07.30 |
REGISTRATION |
||
09.00 |
Keynote Address 3: Welcome to the 0wned World
|
||
10.00 |
Keynote Address 4: Dissolving an Industry as a Hobby
|
||
11:00 |
COFFEE BREAK |
||
|
TRACK I |
TRACK II |
TRACK III |
11:30 |
Pushing the Camel Through the Eye of a Needle
Charl van der Walt (Founder / Managing Director, Sensepost)
|
An Effective Methodology to Enable Security Evaluation at RTL Level
Mary Yeoh (Security Evaluation Lead, Intel Security Center of Excellence [SeCoE]) |
|
12:30 |
LUNCH BREAK |
||
13:30 |
Remote Code Execution Through Intel CPU Bugs
Kris Kaspersky (Independent Network Security Researcher and Author for XAKEP Magazine) |
Next Generation Reverse Shell
|
Bluetooth, 802.11 & RFID Lab - PART 1
Q (HacDC) and King Tuna (Independent Network Security Researcher) |
14:30 |
iPwning the iPhoneCharlie Miller (Principal Analyst, Independent Security Evaluators) |
How to Build Your Own Password Cracker with a Disassembler
|
Bluetooth, 802.11 & RFID Lab - PART 2
Q (HacDC) and King Tuna (Independent Network Security Researcher) |
15:30 |
Decompilers and BeyondIlfak Guilfanov (Founder/CEO Hex-Rays SA and Creator of IDA Pro) |
Cracking into Embedded Devices and Beyond!
Adrian �pagvac� Pastor (ProCheckUp Ltd. / GNUCITIZEN) |
Detecting and Removing Malware Without Anti-Virus Software - PART 1
Ching Tim Meng (Independent Network Security Researcher) |
16:30 |
COFFEE BREAK |
||
17:00 |
Client-side SecurityPetko D. Petkov (Founder, GNUCITIZEN and House of Hackers) |
Top 10 Web 2.0 Attacks
Shreeraj Shah (Founder Blueinfy) |
Detecing and Removing Malware |
18:00 |
CTF PRIZE GIVING + CHARITY AUCTION IN AID OF PR4A (CHILDREN WITH AUTISM) |
||
19:00 |
END |