Saturday 20th
Time | Track 1 (Event Room 1) | |
---|---|---|
9:00AM |
||
10:00AM |
Android Malware Detection in the Cloud Hermes Li |
|
11:00AM |
Practical Attacks on Payment GatewaysEldar Marcussen |
|
12:00PM |
Reverse Engineering a Mass Transit Ticketing SystemTrainHack |
|
1:00PM |
Capture The Flag: Operation SizzlechestEvent Room 3 |
|
2:00PM |
FooCodeChu for Software Analysis, Malware Detection, & Vuln Research Silvio Cesare |
|
3:00PM |
The 3 Rings of the Data Breach CircusMark Goudie |
|
4:00PM |
The Impacts of Advancing Technology on Computer Forensics and E-DiscoveryAdam Daniel |
|
5:00PM |
Ruxcon 2012 PanelEvent Room 1 |
|
7:00PM |
Ruxcon/Rapid7 Party+613-ASK-AROUND |
Track 2 (Event Room 2) | |
---|---|
Exploiting Internal Network Vulns via the Browser Using BeEF Bind Ty Miller & Michele Orru |
|
Targeted Malware – Sophisticated Criminals or Babytown Frolics?Josh Grunzweig & Ryan Merritt |
|
Firefox OS Application SecurityPaul Theriault |
|
Lockpicking WorkshopEvent Room 2 |
|
Homebrew Defensive Security - Take Matters Into Your Own HandsMimeframe |
|
Monitoring repositories for Fun and ProfitLouis Nyffenegger |
Sunday 21st
Time | Track 1 (Event Room 1) | |
---|---|---|
10:00AM |
Examination of the VMWARE ESXi Binary Protocol Using CanapeAlex Chapman |
|
11:00AM |
Finding Needles in Haystacks (The Size of Countries)Michael Baker |
|
12:00PM |
Binary Instrumentation for AndroidCollin Mulliner |
|
1:00PM |
PiP: Remotely Injecting PHY-Layer Packets without a Bug or your RadioTravis Goodspeed |
|
2:00PM |
Bluetooth Packet Sniffing Using Project UbertoothDominic Spill |
|
3:00PM |
Advanced Persistent ResponsePeleus Uhley |
|
4:00PM |
Hardware Backdooring is PracticalJonathan Brossard |
|
5:00PM |
Operation Damara & Operation CraftAlex Tilley |
|
7:00PM |
Ruxcon AfterpartyParts Unknown |
Track 2 (Event Room 2) | |
---|---|
Tracking vulnerable JARsDavid Jorm |
|
How To Catch a Chameleon: Its All In Your Heap Steven Seeley |
|
Dr Strangelock ...or: How I Learned to Stop Worrying and Love the KeyGraeme Bell |
|
Lockpicking CompetitionEvent Room 2 |
|
Defibrillating Web SecurityMeder Kydyraliev |
|
Detecting Source Code Re-use through Metadata and Context Partial HashingDaniel Cabezas |
|
A Tale of Two Firefox BugsFionnbharr Davies |
|
The Blackhole Exploit Kit Spam RunsJon Oliver |