Star 0

Talks

Title Humans
SexyDefense – Maximizing the Home-Field Advantage Ian Amit
An Idiot Abroad Don A. Bailey
2012 in review: Tor and the censorship arms race Runa A. Sandvik
Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves? Jitender Arora
PinPadPwn
House of cards – How not to collapse when bad things happen Rafal Los
Cryptanalysis of the Enigma Machine
I’m the butcher, would you like some BeEF?
Surveillance cameras. The real-world has them everywhere, why not your computer? Michael Viscuso
Security Testing 4G (LTE) Networks
Inside .NET smart card operating system Behrang Fouladi
Passive IPS Reconnaissance and Enumeration – false positive (ab)use Arron Finnon
Hardware security resilience to low-cost attacks Sergei Skorobogatov
Terrorism, tracking, privacy and human interactions
Software Security Austerity – Software security debt in modern software development Ollie Whitehouse
Day 1 talks Ollie Whitehouse
Toppling Domino – Testing security in a Lotus Notes environment. Darren Fuller
Security Architecture & SMART
V-SAT hacking
Malware analysis as a hobby
Post-Exploitation Tu-Dot-Oh! Rich Smith
What the HEC? Security implications of HDMI Ethernet Channel and other related protocols Andy Davis
Big game hunting Tim Brown
DGA Detection & Optimization Gunter Ollman
Hacking and Forensics on the Go
Securing the Internet: YOU’re doing it wrong (An INFOSEC Intervention) Jayson E. Street
I’m the guy your CSO warned you about Gavin Ewan