SexyDefense – Maximizing the Home-Field Advantage
|
Ian Amit
|
An Idiot Abroad
|
Don A. Bailey
|
2012 in review: Tor and the censorship arms race
|
Runa A. Sandvik
|
Why Integrity is left alone and not given TLC (Tender, Love and Care) it deserves?
|
Jitender Arora
|
PinPadPwn
|
|
House of cards – How not to collapse when bad things happen
|
Rafal Los
|
Cryptanalysis of the Enigma Machine
|
|
I’m the butcher, would you like some BeEF?
|
|
Surveillance cameras. The real-world has them everywhere, why not your computer?
|
Michael Viscuso
|
Security Testing 4G (LTE) Networks
|
|
Inside .NET smart card operating system
|
Behrang Fouladi
|
Passive IPS Reconnaissance and Enumeration – false positive (ab)use
|
Arron Finnon
|
Hardware security resilience to low-cost attacks
|
Sergei Skorobogatov
|
Terrorism, tracking, privacy and human interactions
|
|
Software Security Austerity – Software security debt in modern software development
|
Ollie Whitehouse
|
Day 1 talks
|
Ollie Whitehouse
|
Toppling Domino – Testing security in a Lotus Notes environment.
|
Darren Fuller
|
Security Architecture & SMART
|
|
V-SAT hacking
|
|
Malware analysis as a hobby
|
|
Post-Exploitation Tu-Dot-Oh!
|
Rich Smith
|
What the HEC? Security implications of HDMI Ethernet Channel and other related protocols
|
Andy Davis
|
Big game hunting
|
Tim Brown
|
DGA Detection & Optimization
|
Gunter Ollman
|
Hacking and Forensics on the Go
|
|
Securing the Internet: YOU’re doing it wrong (An INFOSEC Intervention)
|
Jayson E. Street
|
I’m the guy your CSO warned you about
|
Gavin Ewan
|