Star 0

Talks

Title Humans
PDF Attack: A Journey From the Exploit Kit to the Shellcode Jose Miguel Esparza , Fox-IT
Advanced JPEG Steganography and Detection John Ortiz , Harris IT Services
Discovering Debug Interfaces with the JTAGulator Joe Grand , Grand Idea Studio, Inc.
Beyond 'Check The Box': Powering Intrusion Investigations Jim Aldridge , Mandiant
I Know You Want Me - Unplugging PlugX Takahiro Haruyama , Hiroshi Suzuki , Internet Initiative Japan, Inc.
JS Suicide: Using JavaScript Security Features to Kill JS Security Ahamed Nafeez , Citrix Systems
OFFENSIVE: Exploiting DNS Servers Changes Leonardo Nve , S21Sec
The Machines That Betrayed Their Masters Glenn Wilkinson , SensePost
Z:\Make Troy\, Not War: Case Study of the Wiper APT in Korea, and Beyond Kyle Yang , Fortinet, Inc.
The Inner Workings of Mobile Cross-Platform Technologies Simon Roses Femerling , VULNEX
Diving Into IE 10's Enhanced Protected Mode Sandbox Mark Vincent Yason , IBM
USB Attacks Need Physical Access Right? Not Any More... Andy Davis , NCC Group
Persist It: Using and Abusing Microsoft's Fix It Patches Jon Erickson , iSIGHT Partners
Ultimate Dom Based XSS Detection Scanner on Cloud Nera W. C. Liu , Albert Yu , Yahoo!
AIS Exposed. Understanding Vulnerabilities and Attacks 2.0 Marco Balduzzi , Trend Micro Research
Dude, WTF in My CAN! Alberto Garcia Illera , Javier Vazquez Vidal , CarIT
Privacy-by-Design for the Security Practitioner Richard Chow , Intel Corporation
Owning a Building: Exploiting Access Control and Facility Management Systems Billy Rios , Qualys
Tomorrow's News is Today's Intel: Journalists as Targets and Compromise Vectors Morgan Marquis-Boire , Shane Huntley , Google Inc.
SAP, Credit Cards, and the Bird That Knows Too Much Ertunga Arsal , ESNC
Say It Ain't So - An Implementation of Deniable Encryption Ari Trachtenberg , Boston University
Let's Fix the Mess Dr. Steve Crocker , Internet Corporation of Assigned Names and Numbers
You Can't See Me: A Mac OS X Rootkit Uses the Tricks You Haven't Known Yet Sung-ting Tsai , Ming-chieh Pan , Team T5
Solutum Cumulus Mediocris Eldar Marcussen , BAE Systems Applied Intelligence
Building Trojan Hardware at Home JP Dunning
UI Redressing Attacks on Android Devices Revisited Marcus Niemietz , Ruhr-University Bochum
Disasters in the Making: How I Torture Open Government Data Systems for Fun, Profit, and Time Travel Tom Keenan , University of Calgary
Comprehensive Virtual Appliance Detection Kang Li , Xiaoning Li , University of Georgia
Scan All the Things - Project Sonar Mark Schloesser , Rapid7
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts Nitesh Dhanjani