• 1
  • 100 bugs in 100 days: An analysis of ICS (SCADA) software

    Terry McCorkle, Billy Rios
    Sat, 16:00 - 16:50
    Track 3
  • 7
  • 73o7\/\/@\/\/Ki – Survival Hacking your way out of Armageddon

    Matthew Becker
    Sat, 12:00 - 12:50
    Track 2
  • A
  • Adaptive Penetration Testing

    David Kennedy, Kevin Mitnick
    Fri, 12:00 - 12:50
    Track 1
  • Advanced Nmap Scripting: Make Nmap work for you!

    Ron Bowes
    Sun, 12:00 - 12:50
    Track 2
  • Advanced Penetration Techniques for the non-technical n00b

    Jason N00bz
    Sun, 09:00 - 09:50
    Track 2
  • Anti-Forensics for the Louise

    int0x80
    Sat, 16:00 - 16:50
    Track 1
  • A Tribute to Dr. Strangelove

    Chris Roberts
    Sun, 09:00 - 09:50
    Track 3
  • Avoiding the Landmines in your own Backyard

    Bart Hopper
    Sat, 13:00 - 13:50
    Track 2
  • B
  • Battery Firmware Hacking

    Charlie Miller
    Sun, 09:00 - 09:50
    Track 1
  • Beat to 1337: Creating A Successful University Cyber Defense Organization

    Mike Arpaia
    Sat, 10:00 - 10:50
    Track 1
  • BioMining: Data Mining for (Neuro) hackers

    Magen Hughes
    Sat, 19:00 - 19:50
    Track 1
  • Blue team is sexy — refocusing on defense — Part II — All you baseline are belong to us

    Mick Douglas
    Sun, 11:00 - 11:50
    Track 3
  • Building a Svartkast: Cheap hardware to leave behind on someone else’s network

    Adrian Crenshaw
    Sat, 19:00 - 19:50
    Track 2
  • C
  • Closing Ceremony

     
    Sun, 15:00 - 15:50
    Track 1
  • Collecting Underpants To Win Your Network

    Ryan Linn
    Sun, 11:00 - 11:50
    Track 1
  • Compliance: An Assault on Reason

    Chris Nickerson
    Fri, 15:00 - 15:50
    Track 1
  • Covert Channels using IP Packet Headers

    Joff Thyer
    Sat, 18:00 - 18:50
    Track 1
  • D
  • Desktop Betrayal: Exploiting Clients through the Features They Demand

    Tom Eston, Kevin Johnson
    Sun, 14:00 - 14:50
    Track 1
  • Dirty Red Team tricks

    Raphael Mudge
    Sun, 14:00 - 14:50
    Track 2
  • Distinguishing Lockpicks: Raking vs Lifting vs Jiggling and More

    Deviant Ollam
    Sun, 13:00 - 13:50
    Track 2
  • E
  • Exploiting Java Memory Corruption Vulnerabilities

    Joshua Drake
    Sun, 14:00 - 14:50
    Track 3
  • Exploiting PKI for Fun & Profit or The Next Yellow Padlock Icon?

    Thomas Hoffecker
    Sat, 11:00 - 11:50
    Track 2
  • F
  • Free Floating Hostility

    Rick Farina
    Sat, 17:00 - 17:50
    Track 2
  • G
  • Get Off of My Cloud: Cloud Credential Compromise and Exposure

    Ben Feinstein, Jeff Jarmoc
    Sat, 14:00 - 14:50
    Track 3
  • H
  • Hackers for Charity Update

    Johnny Long
    Fri, 11:00 - 11:50
    Track 1
  • Hide yo kids, hide yo wife: Residential security and monitoring the bottom line

    Evan Booth
    Sat, 16:00 - 16:50
    Track 2
  • Hook, Line and Syncer: The Liar for Hire’s Ultimate Tacklebox

    Pat McCoy, Chris Silvers
    Fri, 18:00 - 18:50
    Track 1
  • How I learned to roll my own: Building custom pen testing platforms on the fly

    Spiky Geek
    Sat, 18:00 - 18:50
    Track 3
  • I
  • Infectious Media – Bypassing AutoRun once and for all

    Joshua Kelley
    Sun, 13:00 - 13:50
    Track 1
  • Is locksport a sport?

    Bill Sempf
    Sat, 12:00 - 12:50
    Track 3
  • J
  • Jason Scott’s Shareware Calvacade

    Jason Scott
    Fri, 19:00 - 19:50
    Track 1
  • K
  • Keynote - Acoustic Intrusions

    HD Moore
    Fri, 10:00 - 10:50
    Track 1
  • M
  • Mining Sensitive Information From Images Using Command-Line OCR

    Dennis Kuntz
    Sat, 09:00 - 09:50
    Track 1
  • Mobile App Moolah: Profit taking with Mobile Malware

    Jimmy Shah
    Sat, 15:00 - 15:50
    Track 3
  • O
  • Offensive Countermeasures: Still trying to bring sexy back

    Paul Asadoorian, John Strand
    Sat, 12:00 - 12:50
    Track 1
  • Open source firewalling with pfSense

    Chris Buechler, Scott Ullrich
    Sat, 17:00 - 17:50
    Track 3
  • OpenWIPS-ng

    Thomas d'Otreppe
    Sun, 13:00 - 13:50
    Track 3
  • OSINT Beyond the Basics

    Rick Hayes, Karthik Rangarajan
    Sat, 15:00 - 15:50
    Track 1
  • P
  • Pentesting over Powerlines

    Rob Simon
    Sat, 10:00 - 10:50
    Track 3
  • R
  • Rule 1: Cardio (and 9 other rules to keep intruders out)

    Joe Schorr
    Sat, 10:00 - 10:50
    Track 2
  • S
  • Smile for the Grenade! Camera go Bang!

    Vlad Gostom, Joshua Marpet
    Fri, 19:00 - 19:50
    Track 2
  • Social Engineering is a Fraud

    Jamison Scheeres
    Sun, 12:00 - 12:50
    Track 1
  • sploit me if you can

    Atlas
    Fri, 18:00 - 18:50
    Track 2
  • State of the Framework Address

    James Lee
    Sun, 11:00 - 11:50
    Track 2
  • Steal Everything, Kill Everyone, Cause Total Financial Ruin! (Or How I Walked In And Misbehaved)

    Jayson E. Street
    Sun, 10:00 - 10:50
    Track 2
  • Surviving a Teleporter Accident (It could happen to you)

    Jack Daniel
    Sat, 18:00 - 18:50
    Track 2
  • T
  • Tactical Post Exploitation

    Carlos Perez
    Sat, 11:00 - 11:50
    Track 1
  • The Details Don’t Matter

    Bruce Potter
    Fri, 14:00 - 14:50
    Track 1
  • The Dirty Little Secrets They Didn’t Teach You In Pentesting Class

    Rob Fuller, Chris Gates
    Sat, 14:00 - 14:50
    Track 2
  • The Hidden XSS – Attacking the Desktop

    Kyle Osborne
    Sun, 10:00 - 10:50
    Track 3
  • The Penetration Testing Execution Standard (PTES) Panel

     
    Fri, 13:00 - 13:50
    Track 1
  • Throw It in the River? Towards Real Live Actual Smartphone Security

    Georgia Weidman
    Sat, 09:00 - 09:50
    Track 3
  • Tomorrow you can patch that 0day – but your users will still get you p0wn3d

    Rick Redman
    Sat, 17:00 - 17:50
    Track 1
  • V
  • Virtual trust, Virtual Permission and the Illusion of Security

    infojanitor
    Sat, 13:00 - 13:50
    Track 3
  • W
  • Walking the Green Mile: How to Get Fired After a Security Incident

    Brian Baskin
    Sat, 09:00 - 09:50
    Track 2
  • Welcome to DerbyCon 2011 – Intro to the con and events

    Martin Bos, Adrian Crenshaw, David Kennedy
    Fri, 09:00 - 09:50
    Track 1
  • When Fuzzers Miss: The no Hanging Fruit.

    Tony Huffman
    Sat, 13:00 - 13:50
    Track 1
  • Why InfoSec Practitioners Are Failing

    James Arlen
    Sun, 12:00 - 12:50
    Track 3
  • Win32 Exploit Development With Mona and the Metasploit Framework

    Elliott Cutright, Peter Van Eeckhoutte
    Sun, 10:00 - 10:50
    Track 1
  • Y
  • You are the Smart Meter: Making (and hacking) of the 2011 MA-CCDC electronic badges

    Larry Pesce
    Sat, 11:00 - 11:50
    Track 3
  • You’re Going to Need a Bigger Shovel – A Critical Look at Software Security Assurance

    Rafal Los
    Sat, 14:00 - 14:50
    Track 1
  • Your perimeter sucks

    Boris Sverdlik
    Sat, 15:00 - 15:50
    Track 2