Agenda – Conference Day 2 – 17th October 2013
| Training Day 1 | Training Day 2 | Conference Day 1 | Conference Day 2 | PDF (Conference Day 1 & 2) | 
| TRACK 1 | TRACK 2 | TRACK 3 | |
| 8:00 AM | MORNING COFFEE | ||
| 9:00 AM | KEYNOTE 2 – Bringing Social to Security
 Joe Sullivan (Chief Security Officer, Facebook)  | 
||
| 10:00 AM | COFFEE / TEA BREAK | ||
| 10:30 AM | |||
| Diving Into IE 10′s Enhanced Protected Mode Sandbox
 Mark Vincent Yason (Security Researcher, IBM X-Force)  | 
Cracking and Analyzing Apple’s iCloud Protocols
 Vladimir Katalov (Co-Founder, Elcomsoft Co. Ltd.)  | 
Lost in Translation
 Luiz Eduardo (Director, Trustwave SpiderLabs) & Joaquim Espinhara (Security Consultant, Trustwave)  | 
|
| 11:30 AM | |||
| SHAttered Dreams
 Joshua ‘@p0sixninja’ Hill (Independent Security Researcher)  | 
Tracking and Characterizing Botnets Using Automatically Generated Domains
 Stefano Zanero (Politecnico di Milano)  | 
Thawting Evil Maid Attacks: Physically Unclonable Functions for Hardware Tamper Detection
 Eric Michaud (Rift Recon) & Ryan Lackey (HavenCo)  | 
|
| 12:30 PM | LUNCH BREAK | ||
| 1:30 PM | |||
| The Forger’s Art: Exploiting XML Digital Signature Implementations 
 James Forshaw (Head of Vulnerability Research, Context Information Security)  | 
Tales from iOS 6 Exploitation and iOS 7 Security Changes
 Stefan Esser (Head of R&D, SektionEins GmbH)  | 
Trusted Friend Attack: When Guardian Angels Strike
 Ashar Javad (Research Assistant, Ruhr University Bochum)  | 
|
| 2:30 PM | |||
| How Apple Can Read Your iMessages and How You Can Prevent It 
 Cyril ‘@pod2g’ & GG (Security Researchers, QuarksLab)  | 
Static Analysis and Dynamic Instrumentation for Intelligent Exploit Analysis
 Rahul Sasi (Security Researcher)  | 
20 Ways to Secure Boot
 Job de Haas (Senior Specialist, Riscure)  | 
|
| 3:30 PM | COFFEE / TEA BREAK | ||
| 4:00 PM | |||
| Digging Deeper into Aviation Security
 Hugo Teso (Security Consultant, n.runs Professionals)  | 
TraceDroid: A Fast and Complete Android Method Tracer 
 Victor van der Veen (Security Consultant, ITQ)  | 
Facebook OSINT: It’s Faster Than Speed Dating 
 Keith Lee & Jonathan Werrett (Trustwave SpiderLabs)  | 
|
| 5:00 PM | CLOSING KEYNOTE: UFOs and Government: A Case Study in Disinformation, Deception, and Perception Management
 Richard Thieme (Founder, ThiemeWorks) *** SKYPE VIDEO RECORDING ***  | 
||
| 6:00 PM | CTF PRIZE GIVING + HACKWEEKDAY WINNER ANNOUNCEMENTS + CLOSING CEREMONY | ||
| 6:30 PM | THE END – Post Conference Party @ Marini’s on 57 starting at 21:30 – Tickets are available at the HITB Booth | ||
| OS / SOFTWARE | EMBEDDED | NETWORK | EXPLOIT | ||||
|---|---|---|---|---|---|---|---|
| GENERAL HACK FU | MOBILE | WEB | 















































