Agenda – Conference Day 1 – 16th October 2013
| Training Day 1 | Training Day 2 | Conference Day 1 | Conference Day 2 | PDF (Conference Day 1 & 2) | 
| TRACK 1 | TRACK 2 | HITB LABS | |
| 7:30 AM | REGISTRATION / MORNING COFFEE | ||
| 9:00 AM | KEYNOTE 1 – Cognitive Injection: Reprogramming the Situation-Oriented Human OS 
 Andy Ellis (Chief Security Officer, Akamai)  | 
||
| 10:00 AM | COFFEE BREAK | ||
| 10:30 AM | |||
| Hey Captain, Where’s Your Ship? Attacking Vessel Tracking Systems for Fun and Profit
 Dr. Marco Balduzzi, Kyle Wihoit (Trend Micro) & Alessandro Pasta (Independet Researcher)  | 
Under the Hood: How Actaeon Unveils Your Hypervisor 
 Mariano Graziano & Andrea Lanzi (Researchers, Eurecom Research Center)  | 
Hunting for OS X Rootkits in Memory
 Cem Gurkok (Threat Intelligence R&D Manager, Verizon Terremark)  | 
|
| 11:30 AM | |||
| Android DDI: Dynamic Dalvik Instrumentation of Android Applications and Framework
 Collin Mulliner (Researcher, Systems Security Lab, Northeastern University)  | 
Using Online Activity as Digital DNA to Create a Better Spear Phisher
 Joaquim Espinhara (Security Consultant, Trustwave) & Ulisses Albuquerque (Security Consultant, Trustwave)  | 
||
| 12:30 PM | LUNCH BREAK | ||
| 1:30 PM | |||
| Practical Attacks Against Encrypted VoIP Communications
 Dominic Chell (Director, MDSec) & Shaun Colley (Security Consultant, MDSec)  | 
Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions
 Andy Davis (Research Director, NCC Group)  | 
Using Visualization to Analyze Malware
 Wes Brown (Chief Architect, ThreatGRID)  | 
|
| 2:30 PM | |||
| Demystifying Game Console Security: Over 10 Years of Ownage Unraveled
 Peter ‘@bl4sty’ Geissler (Independent Security Researcher)  | 
Owning a Cisco VOIP Environment: Exploiting the Call Manager
 Francisco (IT Security Engineer, Lexfo)  | 
||
| 3:30 PM | COFFEE BREAK | ||
| 4:00 PM | |||
| Defeating Signed BIOS Enforcement
 Corey Kallenberg, John Butterworth & Xeno Kovah (The MITRE Corporation)  | 
RFIDler: A Software Defined RFID Reader/Writer/Emulator
 Adam Laurie (Director, Aperture Labs)  | 
Sending Out An SOS: Session Origin Security
 Mike Shema (Director of Engineering, Qualys)  | 
|
| 5:00 PM | |||
| Hacking Corporations Using Unconventional Chained Exploits
 Gianni Gnesa (Security Researcher, Ptrace Security)  | 
TCP Idle Scans in IPv6
 Mathias Morbitzer (Masters Student, Radboud University Nijmegen)  | 
||
| 6:00 PM | END | ||
| OS / SOFTWARE | EMBEDDED | NETWORK | EXPLOIT | ||||
|---|---|---|---|---|---|---|---|
| GENERAL HACK FU | MOBILE | WEB | 















































