Agenda – Conference Day 2 – 11th April 2013
| Training Day 1 | Training Day 2 | Conference Day 1 | Conference Day 2 | PDF (Conference Day 1 & 2) |
| TRACK 1 | TRACK 2 | TRACK 3 / HITB LABS | |
| 8:00 AM | MORNING COFFEE | ||
| 9:00 AM | KEYNOTE 2: Rethinking the Front LinesBob Lord (Director of Information Security, Twitter) | ||
| 10:00 AM | COFFEE / TEA BREAK | ||
| 10:30 AM | |||
| How I Met Your Modem
Peter ‘blasty’ Geissler & Steven Ketelaar (Independent Researchers) |
Abusing Browser User Interfaces for Fun and Profit
Rosario Valotta (Tentacola Viola) |
Attacking Ruby on Rails Applications
Joernchen (Phenoelit) |
|
| 11:30 AM | |||
| OAuth 2.0 and the Road to XSS
Andrey Labunets & Egor Homakov (Tyumen State University) |
Who Can Hack a Plug? The Infosec Risks of Charging Electric Cars
Ofer Shezaf (Security Solutions Manager, HP ArcSight) |
||
| 12:30 PM | LUNCH BREAK | ||
| 1:30 PM | |||
| Swiping Through Modern Security Features
Cyril ‘@pod2g’, Eric ‘@MuscleNerd’, David ‘@planetbeing’ Wang & Nikias ‘@pimskeks’ Bassen (Team Evad3rs) |
You Can Be Anything You Want to Be: Breaking Through Certified Crypto in Banking Apps
Andrew Petukhov (Founder/CTO, Solidlab), George Noseevich (PhD Candidate, MSU) & Dennis Gamayunov (Acting Head, Information Systems Security Lab, MSU) |
Secure Coding: Web & Mobile
Jim Manico (Vice President of Security Architecture, WhiteHat Security) |
|
| 2:30 PM | |||
| To Watch or Be Watched: Turning Your Surveillance Camera Against You
Sergey Shekyan (Senior Software Engineer, Qualys) & Artem Harutyunyan (Software Architect, Qualys) |
iNalyzer: No More Blackbox iOS Analysis
Chilik Tamir (Chief Scientist, AppSec Labs) |
||
| 3:30 PM | COFFEE / TEA BREAK | ||
| 4:00 PM | |||
| Dreamboot: A UEFI Bootkit
Sebastien Kaczmarek (Senior Security Researcher, QuarsLAB) |
System Shock: The Shodan Computer Search Engine
Dan Tentler (Founder, Aten Labs) |
Terminal Cornucopia
Evan Booth (Founder, Recursive Squirrel Interactive) |
|
| 5:00 PM | CLOSING KEYNOTE: The History of the Future of InfoSec Winn Schwartau (Founder, SecurityExperts.com) | ||
| 6:00 PM | CLOSING CEREMONY + CTF PRIZE GIVING + SOGETI SSEC2013 WINNER ANNOUNCEMENTS | ||
| 6:30 PM | END | ||
| OS / SOFTWARE | HARDWARE / EMBEDDED | ANALYSIS | |||
|---|---|---|---|---|---|
| GENERAL HACK FU | MOBILE | CRYPTO |

















































