Schedule

Saturday 20th

Time Track 1 (Event Room 1)

9:00AM

De Mysteriis Dom Jobsivs: Mac EFI Rootkits
Snare

10:00AM

Android Malware Detection in the Cloud
Hermes Li

11:00AM

Practical Attacks on Payment Gateways
Eldar Marcussen

12:00PM

Reverse Engineering a Mass Transit Ticketing System
TrainHack

1:00PM

Capture The Flag: Operation Sizzlechest
Event Room 3

2:00PM

FooCodeChu for Software Analysis, Malware Detection, & Vuln Research
Silvio Cesare

3:00PM

The 3 Rings of the Data Breach Circus
Mark Goudie

4:00PM

The Impacts of Advancing Technology on Computer Forensics and E-Discovery
Adam Daniel

5:00PM

Ruxcon 2012 Panel
Event Room 1

7:00PM

Ruxcon/Rapid7 Party
+613-ASK-AROUND

Track 2 (Event Room 2)

Exploiting Internal Network Vulns via the Browser Using BeEF Bind
Ty Miller & Michele Orru

Thar' be Vuln. ID's Here - A Data Mining Case Study
Matt J

Targeted Malware – Sophisticated Criminals or Babytown Frolics?
Josh Grunzweig & Ryan Merritt

Firefox OS Application Security
Paul Theriault

Lockpicking Workshop
Event Room 2

Homebrew Defensive Security - Take Matters Into Your Own Hands
Mimeframe

Windows Kernel Fuzzing For Beginners
Ben Nagy

Monitoring repositories for Fun and Profit
Louis Nyffenegger

Sunday 21st

Time Track 1 (Event Room 1)

10:00AM

Examination of the VMWARE ESXi Binary Protocol Using Canape
Alex Chapman

11:00AM

Finding Needles in Haystacks (The Size of Countries)
Michael Baker

12:00PM

Binary Instrumentation for Android
Collin Mulliner

1:00PM

PiP: Remotely Injecting PHY-Layer Packets without a Bug or your Radio
Travis Goodspeed

2:00PM

Bluetooth Packet Sniffing Using Project Ubertooth
Dominic Spill

3:00PM

Advanced Persistent Response
Peleus Uhley

4:00PM

Hardware Backdooring is Practical
Jonathan Brossard

5:00PM

Operation Damara & Operation Craft
Alex Tilley

7:00PM

Ruxcon Afterparty
Parts Unknown

Track 2 (Event Room 2)

Tracking vulnerable JARs
David Jorm

How To Catch a Chameleon: Its All In Your Heap
Steven Seeley

Dr Strangelock ...or: How I Learned to Stop Worrying and Love the Key
Graeme Bell

Lockpicking Competition
Event Room 2

Defibrillating Web Security
Meder Kydyraliev

Detecting Source Code Re-use through Metadata and Context Partial Hashing
Daniel Cabezas

A Tale of Two Firefox Bugs
Fionnbharr Davies

The Blackhole Exploit Kit Spam Runs
Jon Oliver