Star 0


Title Humans
Punking Punkbuster Isaac Dawson
Breaking Bad Programs Don A. Bailey
A Fast Hard Disk with Active Antiforensics Travis Goodspeed
Evading Identification and Detection by Messing with Binary Formats Ange Albertini
.Net Havoc – Manipulating Properties of Dormant Server Side Web Controls Shay Chen
Honey I’m Home!! – Hacking Z-Wave Home Automation Systems.
Persistent, Stealthy, Remote-controlled Dedicated Hardware Malware
Reverse Engineering with HackRF Michael Ossmann
Security Lessons from Dictators Jerry Gamblin
A Captive Audience Jaime Cochran
I miss LSD Tim Brown
Reversing and Exploiting BT CPE Devices Zachary Cutlip
Even More Tamagotchis Were Harmed in the Making of this Presentation Natalie Silvanovich
Hack the Gibson – Exploiting Supercomputers
Building Antibodies – The Phishing program at Twitter. Dan Tentler
Signatureless Breach Detection Under The Microscope
A talk about (info-sec) talks Haroon Meer
Browser bug hunting – Memoirs of a last man standing Atte Kettunen
My quest into FM-RDS Oona Räisänen
The Forger’s Art: Exploiting XML Digital Signature Implementations James Forshaw
Best Practices and the Future of Adaptive Authentication
Surviving the 0-day – Reducing the Window of Exposure Andreas Lindh