• Tuesday, April 16
  • CANCELLED - An Examination of String Allocations in Internet Explorer 9

    Christopher Valasek
    Tue, 13:00 - 13:50
    Library
  • Rise in ATM Compromises

    Luiz Eduardo, Ryan Linn, Dos Santos
    Tue, 13:00 - 13:50
    Library
  • Attacking Cloud Services with Source Code

    Jonathan Claudius
    Tue, 14:00 - 14:50
    Library
  • JavaScript Pitfalls

    Ming Chow
    Tue, 15:30 - 16:20
    Library
  • CANCELLED - Let's Write Some IOS Malware

    Christien Rioux
    Tue, 16:30 - 17:30
    Library
  • We have seen the future, and it is not pretty

    Chris Wysopal
    Tue, 16:30 - 17:20
    Library
  • Wednesday, April 17
  • Third Party Security Assurance: The Service Provider Perspective

    John Nye
    Wed, 11:00 - 11:50
    Library
  • Distributed Security: Expanding the Toolkit for Institutional Resilience

    Sandy Carielli, Sam Curry
    Wed, 13:30 - 14:20
    Library
  • Birds, bots and machines - Fraud in Twitter and how to detect it using Machine Learning Techniques

    Vicente Diaz
    Wed, 14:30 - 15:20
    Library
  • "Cyber" Momentum: Understanding & Leveraging the National Cybersecurity Policy Debate

    Jack Whitsitt
    Wed, 16:00 - 16:50
    Library
  • Punch and Counter-punch with .Net Apps

    J. Wolfgang Goerlich
    Wed, 17:00 - 17:30
    Library
  • Thursday, April 18
  • Kinetic Pwnage: Obliterating the Line Between Computers and the Physical World

    Ed Skoudis
    Thu, 11:00 - 11:50
    Library
  • Protecting sensitive information on iOS devices

    David Schuetz
    Thu, 13:30 - 14:20
    Library
  • Blitzing with your Defense

    Ben Jackson
    Thu, 14:30 - 15:20
    Library
  • Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics)

    Dan Geer, Andrew Hay
    Thu, 15:30 - 16:20
    Library