Keynote
Legal Aspects of Cybersecurity - (AKA) CYBERLAW: A Year in Review, Cases, issues, your questions my
Virtualization under attack: Breaking out of KVM
Trillions of Lines of Code and Counting - Securing Applications At Scale
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
USB - Undermining Security Barriers
Microsoft Vista: NDA-less The Good, The Bad, and The Ugly
Hacking Androids for Profit
Zero Day Malware Cleaning with the Sysinternals Tools
Breaking Encryption in the cloud: Cheap, GPU assisted supercomputing for everyone
The Law of Mobile Privacy and Security
Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers
Sophail: A Critical Analysis of Sophos Antivirus
Sour Pickles
Battery Firmware Hacking
Staring into the Abyss: The Dark Side of Secuirity and Professional Intelligence
Exploiting the iOS Kernel
SSL And The Future Of Authenticity
Inside Apple's MDM Black Box
Security When Nano-seconds Count
Crypto for Pentesters
Exploiting USB Devices with Arduino
InfoSec 2021 - A Career Odyssey
Owning Your Phone at Every Layer - A Mobile Security Panel
Pentesting the Smart Grid
Investigating Live CDs using Volatility and Physical Memory Analysis
Faces Of Facebook - Or, How The Largest Real ID Database In The World Came To Be
A Crushing Blow At The Heart of SAP J2EE Engine
Vulnerability Extrapolation or 'Give me more Bugs like that, please!'
Smartfuzzing The Web: Carpe Vestra Foramina
Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System
Don't Hate the Player, Hate the Game: Inside the Android Security Patch Lifecycle
Lives On The Line: Defending Crisis Maps in Libya, Sudan, and Pakistan
Hacking and Forensicating an Oracle Database Server
Sticking to the Facts: Scientific Study of Static Analysis Tools
Automated Detection of HPP Vulnerabilities in Web Applications
Chip & PIN is definitely broken
Mobile Malware Madness, and How To Cap the Mad Hatters