Registration opens at 8:00AM on Saturday 11th October.
Saturday 11 October
Time | Track 1 (Event Room 1) | ||
---|---|---|---|
9:00AM |
The Devil in the Detail - Advanced Forensic Artefact Analysis & More Tales From the CoalfaceAdam Daniel |
||
10:00AM |
iOS 8 - Containers, Sandboxes and EntitlementsStefan Esser |
||
11:00AM |
Blowing up the Celly - Building Your Own SMS/MMS FuzzerBrian Gorenc & Matt Molinyawe |
||
12:00PM |
Bitcoin Transaction Malleability Theory In PracticeDaniel Chechik & Rami Kogan |
||
1:00PM |
Ruxbot WarsLanai Bar Courtyard |
||
2:00PM |
Crash & Pay: Reading, Cloning and Fuzzing RFID Payment CardsPeter Fillmore |
||
3:00PM |
Tools of the NSA PlaysetJoe FitzPatrick & Mike Ryan |
||
4:00PM |
Safecracking on a BudgetJay Davis and Luke Jahnke |
||
5:00PM |
Software Defined Radness: HackRF meets +613y011 & liamosaur |
||
6:00PM |
Turbo TalksLanai Bar |
||
7:00PM |
Ruxcon PartyTBA |
Track 2 (Event Room 2) | |||
---|---|---|---|
Cyber Necromancy: Reverse Engineering Dead ProtocolsMatt Halchyshak & Joe Tartaro |
|||
Windows ShellBags Forensics in DepthVincent Lo |
|||
Breaking Bricks and Plumbing Pipes: Cisco ASA a Super Mario AdventureAlec Stuart-Muirk |
|||
Ruxcon Black BagLanai Bar (First round starts at 10:00AM) |
|||
Ransomware - A Study of EvolutionPeter Szabo |
|||
BIOS and Secure Boot Attacks UncoveredJohn Loucaides |
|||
Extreme Privilege Escalation on Windows 8/UEFI SystemsCorey Kallenberg |
|||
EMET 5.0 – Armor or Curtain?René Freingruber |
Sunday 12 October
Time | Track 1 (Event Room 1) | ||
---|---|---|---|
9:00AM |
Recapping: Breaking the Security of Physical DevicesSilvio Cesare |
||
10:00AM |
Image and Video Forensics – An image is Worth 1000 Frauds Robert Winkel |
||
11:00AM |
Exploiting SQL Race Conditions and Other OdditiesDavid Litchfield |
||
12:00PM |
|||
1:00PM |
Chilli Eating CompetitionLanai Bar Courtyard |
||
2:00PM |
Homebrew Incident ResponseMimeframe & Mcgrew |
||
3:00PM |
International Voicemail Security And Bypassing 2FA For Fun And ProfitShubham Shah |
||
4:00PM |
Panel 2014Event Room 1 |
||
7:00PM |
Track 2 (Event Room 2) | ||
---|---|---|
Linux Kernel Futex Fun: Exploiting CVE-2014-3153Dougall Johnson |
||
Write Once, Run Anywhere: A Tour Of Java Remote Code Execution VectorsDavid Jorm |
||
Finding Bugs The Rube-Goldberg WayMark Brand |
||
Let's Talk About SOAP Baby, Let's Talk About UPnPRicky Lawshae |
||
Lockpicking WorkshopEvent Room 2 |
||
Bolt on some CryptoMichael Samuel |
||
Writing Zero Days for Security - APT PenTesting FrameworkSean Park |