Saturday 26 October
Time | Track 1 (Event Room 1) | |
---|---|---|
9:00AM |
A Beginner's Journey into the World of Hardware HackingSilvio Cesare |
|
10:00AM |
Top of the Pops: How to top the charts with zero melodic talent and a few friendly computersPeter Fillmore |
|
11:00AM |
VoIP Wars: Return of the SIPFatih Ozavci |
|
12:00PM |
||
1:00PM |
Capture The FlagBar Room |
|
2:00PM |
Malware, Sandboxing and You: How Enterprise Malware and 0day Detection is About To Fail (Again)Jonathan Brossard |
|
3:00PM |
Introspy : Security Profiling for Blackbox iOS and AndroidAlban Diquet & Marc Blanchou |
|
4:00PM |
The Art Of Facts - A look at Windows Host Based Forensic InvestigationAdam Daniel |
|
5:00PM |
The Ruxcon 2013 PanelEvent Room 1 |
|
7:00PM |
Track 2 (Event Room 2) | |
---|---|
Edward Snowden: It's ComplicatedPatrick Gray |
|
AntiTraintDroid - Escaping Taint Analysis on Android for Fun and ProfitGolam 'Babil' Sarwar |
|
Cracking and Analyzing Apple iCloud Protocols: iCloud Backups, Find My iPhone, Document StorageVladimir Katalov |
|
50 Shades of Oddness - Inverting the Anti-Malware ParadigmPeter Szabo |
|
Lockpick WorkshopEvent Room 2 |
|
Visualization For Reverse Engineering and ForensicsDanny Quist |
|
Deus Ex Concolica - Explorations in end-to-end automated binary exploitationMark 'c01db33f' Brand |
|
BIOS Chronomancy: Fixing the Static Root of Trust for MeasurementJohn Butterworth |
Sunday 27 October
Time | Track 1 (Event Room 1) | |
---|---|---|
10:00AM |
Amateur Satellite Intelligence: Watching North KoreaDave Jorm |
|
11:00AM |
Electronic Voting Security, Privacy and VerifiabilityVanessa Teague |
|
12:00PM |
Buried by time, dust and BeEFMichele Orru |
|
1:00PM |
RuxLox CompetitionBar Area |
|
2:00PM |
Bypassing Content-Security-PolicyAlex "kuza55" Kouzemtchenko |
|
3:00PM |
Inside Story Of Internet Banking: Reversing The Secrets Of Banking MalwareSean Park |
|
4:00PM |
Payment Applications Handle Lots of Money. No, Really: Lots Of It.Mark Swift & Alberto Revelli |
|
5:00PM |
Espionage: Everything Old Is New AgainKayne Naughton |
|
7:00PM |
Track 2 (Event Room 2) | |
---|---|
Schoolin' In: How to Build Better HackersBrendan Hop |
|
Roll the Dice and Take Your ChancesThiébaud Weksteen |
|
Underground: The Julian Assange story (with Q&A)Suelette Dreyfus & Ken Day |
|
Under the Hood Of Your Password GeneratorMichael Samuel |
|
Cracking, CUDA and the Cloud – Cracking Passwords Has Never Been So Simple, Fast and CheapJohn Bird |
|
Mining Mach Services within OS X SandboxMeder Kydyraliev |
|
Wardriving in the cloud: A closer look at Apple and Google location servicesHubert Seiwert |