Title |
Speakers |
Summary |
Topic Types |
Practical Exploitation of Embedded Systems |
Andrea Barisani
,
Daniele Bianco
|
N/A |
Reverse Engineering
ExcludeThinkstScapes
Attack
Embedded
|
You and Your Research |
Haroon Meer
|
N/A |
Security
|
Tracking Large Scale Botnets |
Jose Nazario
|
N/A |
Botnets
ExcludeThinkstScapes
Defence
Network Monitoring
|
Data Mining a Mountain of Vulnerabili4es |
Chris Wysopal
|
N/A |
Statistics
ExcludeThinkstScapes
|
Hackers, The Movie: A Retrospec4ve |
Don Bailey
|
N/A |
Security
|
Don't Stand So Close to Me: An Analysis of the NFC Attack Surface |
Charlie Miller
|
N/A |
|
6000 Ways and More: A 15 Year Perspective on Why Telcos Keep Getting Hacked |
Philippe Langlois
,
Emmanuel Gadaix
|
N/A |
ExcludeThinkstScapes
Attack
Mobile Security
Network Protocols
|
Defibrilating Web Security |
Meder Kydyraliev
|
N/A |
ExcludeThinkstScapes
Defence
Java
Taint Tracking
Ruby
|
Messing Up the Kids Playground: Eradicating Easy Targets |
Fyodor Yarochkin
,
Vladimir borisovich Kropotov
|
N/A |
Botnets
ExcludeThinkstScapes
Defence
|
A Short History of The JavaScript Security Arsenal |
Petko ( pdp ) D. Petkov
|
N/A |
|
Supercompu4ng, Malware and Correla4on: What a Year in the Life of a MD5 Taught Us |
Wes Brown
|
N/A |
Computer Forensics
Reverse Engineering
Malware
ExcludeThinkstScapes
|
A Historical Look at The Personal Computer and The Phreaking Scene |
John Draper
|
N/A |
Security
|
Data is Poli4cal |
Peter brokep Sunde
,
Fredrik famo Neij
|
N/A |
|
iOS6 Security |
Mark Dowd
,
Tarjei Mandt
|
N/A |
|
Innovative Approaches to Exploit Delivery |
Saumil Udayan Shah
|
N/A |
Exploitation
Web Security
ExcludeThinkstScapes
Attack
|
Mozilla Apps, Firefox OS and You |
Lucas Adamski
|
N/A |
Security
|
IPv6 Insecurity Revolu4ons |
Marc Heuse
|
N/A |
IPv6
ExcludeThinkstScapes
Attack
|
I Honorably Assure You: It is Secure: Hacking in the Far East |
Paul sebasfan Ziegler
|
N/A |
Security
|
Silo Bus4ng in Informa4on Security: The ISC SIE Approach |
Paul A. Vixie
|
N/A |
Security
|
Why Web Security is Fundamentally Broken |
Jeremiah Grossman
|
N/A |
Web Security
ExcludeThinkstScapes
|
Behavior--based Methods for Automated, Scalable Malware Analysis |
Stefano Zanero
|
N/A |
Reverse Engineering
Malware
ExcludeThinkstScapes
Static Analysis
At Scale
Dynamic Analysis
|
How to Get Along with Vendors Without Really Trying |
Katie Moussouris
|
N/A |
Introductory
IncludeThinkstScapes
Standards
ISO
|
Pwn@Home: An ASack Path to Jailbreaking Your Home Router |
Fredric Raynal
,
Gabriel Campana
|
N/A |
|
PEDA -- Polishing GDB for Exploit Development |
Long Le
,
Thanh Nguyen
|
N/A |
|
XSS & CSRF Strike Back Powered by HTML5 |
Shreeraj Shah
|
N/A |
Security
|
Crypto for the Public Cloud |
John Viega
|
N/A |
Security
|
iOS PANEL DISCUSSION |
Mark Dowd
,
David Wang
,
@musclenerd
,
Cyril
|
N/A |
|
Finding the Weak Link in Binaries |
Ollie Whitehouse
|
N/A |
ExcludeThinkstScapes
Windows
Static Analysis
|
OPSEC: Because Jail is for wufpd |
The Grugq
|
N/A |
Security
|
Behind Enemy Lines |
Mikko Hypponen
|
N/A |
|
A Scien4fic (But Non Academic) Study of Malware Obfusca4on Technologies |
Rodrigo Rubira Branco
|
N/A |
Security
|
Informa4on Warfare & Cyberwar: Whats the Story Morning Glory |
Raoul "Nobody" Chiesa
|
N/A |
Cyberwar
ExcludeThinkstScapes
|
Hacking Huawei VRP |
Felix ( FX ) Lindner
|
N/A |
Network Penetration
ExcludeThinkstScapes
Attack
Huawei
|
Element 1337 in the Periodic Table: Pwnium |
Chris Evans
|
N/A |
ExcludeThinkstScapes
Pwnium
Vulnerability Rewards
|