Keynote: Security Research and Vulnerability Disclosure
Dr. Linton Wells II, Principal Deputy Assistant Secretary of Defense (Networks and Information Integration)
Crystal Ballroom A
Crystal Ballroom B
Finding Digital Evidence in Physical Memory
Implementing and Detecting An ACPI BIOS Rootkit
Lunch: Crystal Ballroom C
Rootkit Hunting vs. Compromise Detection
Combatting Symbian Malware
New Directions in Disk Forensics
Simson L. Garfinkel
Client Side Penetration Testing
FragFS: An Advanced NTFS Data Hiding Technique
Irby Thompson & Mathew Monroe
spoonm & skape
09:00 - 09:50
The Era of a Zero-Day Nation-State: Characterising the real threats to our nation’s critical information systems
Tom Parker & Matthew G. Devost
Analysis of Adversarial Code: Problem, Challenges, Results
Foreign Attacks on Corporate America (How the Federal Government can apply lessons learned from the private sector)
Angel Recon System (ARS) Prototype: Heuristic Vulnerability Analysis and Attack
Playing Server Hide and Seek on the Tor Anonymity Network
Paul Syverson & Lasse Øverlier
Analysis of Web Application Worms and Viruses
Network Black Ops: Extracting Unexpected Functionality from Existing Networks
My IDS is better than yours. Or is it?
How to Automatically Sandbox IIS With Zero False Positive and Negative
Attacks on Uninitialized Local Variables
SCADA Security and Terrorism: We're Not Crying Wolf!
David Maynor & Robert Graham
Attendees must wear badges at all times in the conference areas.
Badges and/or conference proceedings that are lost or reported stolen will incur a $500 replacement fee.
All attendees must be 18 years of age or older to be on the conference floor.