• 10:00
  • Constricting the Web: Offensive Python for Web Hackers

    Marcin Wielgoszewski
    Thu, 10:00 - 11:00
    Milano 1+2+3+4 - Web Apps
  • New Threats to Privacy: From TIA to Google

    Moxie Marlinspike
    Thu, 10:00 - 11:00
    Milano 5+6+7+8 - Privacy
  • Keeping the Good Stuff In: Confidential Information Firewalling with the CRM114 Spam Filter & Text Classifier

    William Yerazunis
    Thu, 10:00 - 11:00
    Roman - Where the Data Lives
  • Memory Corruption Attacks: The (almost) Complete History...

    Haroon Meer
    Thu, 10:00 - 11:00
    Augustus 1+2 - Exploitation
  • CLOUDINOMICON: Idempotent Infrastructure, Survivable Systems & Bringing Sexy Back to Info Centricity

    Christofer Hoff
    Thu, 10:00 - 11:00
    Augustus 3+4 - Cloud Virtualization
  • CSI: TCP/IP

     
    Thu, 10:00 - 11:00
    Pompeiian - Meet the Feds
  • Microsoft Powershell - It's time to own

    Joshua Kelley, David Kennedy
    Thu, 10:00 - 11:00
    Florentine - Turbo
  • Breaking Browsers: Hacking Auto-Complete

    Jeremiah Grossman
    Thu, 10:00 - 11:00
    Florentine - Turbo
  • How to Hack Millions of Routers

    Craig Heffner
    Thu, 10:00 - 11:00
    Augustus 5+6 - Client Side
  • State of SSL on the Internet: 2010 Survey, Results and Conclusions Routers

    Ivan Ristic
    Thu, 10:00 - 11:00
    Forum 24 - Big Picture
  • pyREtic – Reversing obfuscated Python bytecode & live Python objects

    Rich Smith
    Thu, 10:00 - 11:00
    Neopolitan 1+2+3+4 - Reverse Engineering Redux
  • Regional Collegiate Cyberdefense Competition

    Breakout Session
    Thu, 10:00 - 11:00
    Forum 25 - Special Events
  • 11:15
  • Utilizing Code Reuse/Return Oriented Programming in PHP Web Application Exploits

    Stefan Esser
    Thu, 11:15 - 12:30
    Milano 1+2+3+4 - Web Apps
  • Unauthorized Internet Wiretapping: Exploiting Lawful Intercept

    Tom Cross
    Thu, 11:15 - 12:30
    Milano 5+6+7+8 - Privacy
  • Hacking Oracle From Web Apps

    Sumit Siddharth
    Thu, 11:15 - 12:30
    Roman - Where the Data Lives
  • There's a party at Ring0 (and you're invited)

    Tavis Ormandy, Julien Tinnes
    Thu, 11:15 - 12:30
    Augustus 1+2 - Exploitation
  • Secure Use of Cloud Storage

    Grant Bugher
    Thu, 11:15 - 12:30
    Augustus 3+4 - Cloud Virtualization
  • Policy, Privacy, Deterrence and Cyber War

     
    Thu, 11:15 - 12:30
    Pompeiian - Meet the Feds
  • Elevation of Privilege: The Easy way to Threat Model

    Adam Shostack
    Thu, 11:15 - 12:30
    Florentine - Turbo
  • You Will be Billed $90,000 for This Call

    Mikko Hypponen
    Thu, 11:15 - 12:30
    Florentine - Turbo
  • HTTPS Can Byte Me

    Robert Hansen, Josh Sokol
    Thu, 11:15 - 12:30
    Augustus 5+6 - Client Side
  • Becoming the six-million-dollar man

    Gunter Ollmann
    Thu, 11:15 - 12:30
    Forum 24 - Big Picture
  • Voyage of the Reverser: A Visual Study of Binary Species

    Sergey Bratus, Greg Conti
    Thu, 11:15 - 12:30
    Neopolitan 1+2+3+4 - Reverse Engineering Redux
  • Your Career = Your Business

    Lee Kushner, Mike Murray
    Thu, 11:15 - 12:30
    Forum 25 - Special Events
  • 13:45
  • GWT Security: Don’t Get Distracted by Bright Shiny Objects

    David Byrne, Charles Henderson
    Thu, 13:45 - 15:00
    Milano 1+2+3+4 - Web Apps
  • The DMCA & ACTA vs. Academic & Professional Research: How Misuse of this Intellectual Property Legislation Chills Research, Disclosure and Innovation

    Tiffany Rad
    Thu, 13:45 - 15:00
    Milano 5+6+7+8 - Privacy
  • Token Kidnapping's Revenge

    Cesar Cerrudo
    Thu, 13:45 - 15:00
    Roman - Where the Data Lives
  • Return-Oriented Exploitation

    Dino Dai Zovi
    Thu, 13:45 - 15:00
    Augustus 1+2 - Exploitation
  • Virtually Pwned: Pentesting Virtualization

    Claudio Criscione
    Thu, 13:45 - 15:00
    Augustus 3+4 - Cloud Virtualization
  • Human Intel

     
    Thu, 13:45 - 15:00
    Pompeiian - Meet the Feds
  • ISC SIE Passive DNS vs. Apache Cassandra

    Paul Vixie
    Thu, 13:45 - 15:00
    Florentine - Turbo
  • Reverse Engineering with Hardware Debuggers

    Jason Cheatham, Jason Raber
    Thu, 13:45 - 15:00
    Florentine - Turbo
  • Blitzableiter - the Release

    FX
    Thu, 13:45 - 15:00
    Augustus 5+6 - Client Side
  • Defenseless in Depth

    Ryan Smith
    Thu, 13:45 - 15:00
    Forum 24 - Big Picture
  • TitanMist: Your First Step to Reversing Nirvana

    Tomas Pericin, Mario Vuksan
    Thu, 13:45 - 15:00
    Neopolitan 1+2+3+4 - Reverse Engineering Redux
  • Things You Wanted To Know But Were Afraid To Ask About Managing Your Information Security Career

    Lee Kushner, Mike Murray
    Thu, 13:45 - 15:00
    Forum 25 - Special Events
  • 15:15
  • How I Met Your Girlfriend

    Samy Kamkar
    Thu, 15:15 - 16:30
    Milano 1+2+3+4 - Web Apps
  • Attacking Phone Privacy

    Karsten Nohl
    Thu, 15:15 - 16:30
    Milano 5+6+7+8 - Privacy
  • Hacking and protecting Oracle Database Vault

    Esteban Martínez Fayó
    Thu, 15:15 - 16:30
    Roman - Where the Data Lives
  • Understanding the Low- Fragmentation Heap: From Allocation to Exploitation

    Christopher Valasek
    Thu, 15:15 - 16:30
    Augustus 1+2 - Exploitation
  • Virt-ICE: Next Generation Debugger for Malware Analysis

    Quynh Nguyen Anh
    Thu, 15:15 - 16:30
    Augustus 3+4 - Cloud Virtualization
  • Ex-Fed Confessions

     
    Thu, 15:15 - 16:30
    Pompeiian - Meet the Feds
  • SpewPAL: How capturing and replaying attack traffic can save your IDS

    Kyle Cronin, Patrick Engebretson, Dr. Josh Pauli
    Thu, 15:15 - 16:30
    Florentine - Turbo
  • Hadoop Security Design? Just Add Kerberos? Really?

    Andrew Becherer
    Thu, 15:15 - 16:30
    Florentine - Turbo
  • The Black Art of Binary Hijacking

    Nick Harbour
    Thu, 15:15 - 16:30
    Florentine - Turbo
  • Hacking Browser's DOM - Exploiting Ajax and RIA

    Shreeraj Shah
    Thu, 15:15 - 16:30
    Augustus 5+6 - Client Side
  • Need a hug? I'm secure.

    Charles Henderson, Steve Ocepek
    Thu, 15:15 - 16:30
    Forum 24 - Big Picture
  • NEPTUNE: Dissecting Web-based Malware via Browser and OS Instrumentation

    Rami Kawach
    Thu, 15:15 - 16:30
    Neopolitan 1+2+3+4 - Reverse Engineering Redux
  • ISSA

    Panel
    Thu, 15:15 - 16:30
    Forum 25 - Special Events
  • 16:45
  • Deconstructing ColdFusion

    Brandon Creighton, Chris Eng
    Thu, 16:45 - 18:00
    Milano 1+2+3+4 - Web Apps
  • Carmen Sandiego is On the Run!

    Don A. Bailey, Nick DePetrillo
    Thu, 16:45 - 18:00
    Milano 5+6+7+8 - Privacy
  • Cryptographic Agility: Defending Against the Sneakers Scenario

    Bryan Sullivan
    Thu, 16:45 - 18:00
    Roman - Where the Data Lives
  • Advanced AIX Heap Exploitation Methods

    Tim Shelton
    Thu, 16:45 - 18:00
    Augustus 1+2 - Exploitation
  • dirtbox: a Highly Scalable x86/Windows Emulator

    Georg Wicherski
    Thu, 16:45 - 18:00
    Augustus 3+4 - Cloud Virtualization
  • Meet the Feds Reception

     
    Thu, 16:45 - 18:00
    Pompeiian - Meet the Feds
  • Lifting the Fog

    Marco Slaviero
    Thu, 16:45 - 18:00
    Florentine - Turbo
  • USB - HID, The Hacking Interface Design

    Richard Rushing
    Thu, 16:45 - 18:00
    Florentine - Turbo
  • Security is Not a Four Letter Word

    Michael Davis
    Thu, 16:45 - 18:00
    Florentine - Turbo
  • Bad Memories

    Elie Bursztein, Baptiste Gourdin, Gustav Rydstedt
    Thu, 16:45 - 18:00
    Augustus 5+6 - Client Side
  • Lord of the Bing: Taking back search engine hacking from Google and Bing

    Francis Brown, Rob Ragan
    Thu, 16:45 - 18:00
    Forum 24 - Big Picture
  • Goodware drugs for malware: on-the-fly malware analysis and containment

    Damiano Bolzoni, Christiaan Schade
    Thu, 16:45 - 18:00
    Neopolitan 1+2+3+4 - Reverse Engineering Redux