Preliminary Schedule
Please find details for all talks here
Two Days of Trainings (17./18. November)
Workshop 1 | Workshop 2 | Workshop 3 | Workshop 4 | Workshop 5 |
---|---|---|---|---|
Social Engineering Training for IT Security Professionals - Sharon Conheady & Martin Law (First Defence Information Security) |
Security on the GSM Air Interface - David Burgess & Harald Welte (Kestrel Signal Processing, Inc. & HMW-Consulting) |
Designing Secure Protocols And Intercepting Secure Communication - Moxie Marlinspike (Institute For Disruptive Studies) |
Physical Security - Deviant Ollam & Babak Javadi (TOOOL.us) |
Web 2.0 Security - Advanced Attacks and Defense - Shreeraj Shah & Vimal Patel (Blueinfy Solutions Pvt. Ltd.) |
Workshop 6 | Workshop 7 | Workshop 8 |
---|---|---|
Exploit Analysis and Malware Reverse Engineering - Tillmann Werner & Felix Leder (University of Bonn) |
Security Awareness Campaigns - Stefan Schumacher (Kaishakunin.com) |
The Exploit Laboratory - Saumil Shah (net-square) |
All Trainings cover two days (from 09:30 to 18:30 every day) and include Lunch and two Coffee Breaks.
Two Days of Conference (19./20. November)
Throughout the conference you will get the opportunity of meeting experts at the Hacker's Lounge to discuss security issues and see demonstrations.
Day 1 - Nov 19 | Pirouette | Riding School |
---|---|---|
08:00
|
Registration Opens | |
09:00 - 09:10
|
Welcome & Introduction DeepSec Organisation Team (DeepSec.net) |
|
09:10 - 10:00
|
Technology won’t save you, only people will Matt Watchinski (Sourcefire Inc.) |
|
10:00 - 10:50
|
Top 10 Security Issues Developers Don't Know About Neelay S. Shah (Foundstone Inc., A Division of McAfee) |
USB Device Drivers: A Stepping Stone into your Kernel Moritz Jodeit, Martin Johns (n.runs AG, University of Passau) |
10:50 - 11:10
|
Coffee Break | |
11:10 - 12:00
|
Breaking TOR Sessions with HTML5 Marco Bonetti (CutAway Srl) |
Ownage 2.0 Saumil Udayan Shah (Net-Square) |
12:00 - 12:50
|
A Proof-of-Concept Attack on SmartCard-secured Online-Banking Felix Gröbert and Christoph Wegener (Chair for Network and Data Security, Ruhr-University Bochum) |
Dynamic Binary Instrumentation for Deobfuscation and Unpacking Daniel Reynaud and Jean-Yves Marion (Nancy University - Loria) |
12:50 - 14:00
|
Lunch | |
14:00 - 14:50
|
Cloud Services - still too cloudy for take off? Kurt Kammerer (regify AG) |
Key Management Death Match? Competing KM Standards Technical Deep Dive Marc Massar (Semtek) |
14:50 - 15:40
|
Get your head out of the clouds: Security in Software-plus-Services John Walton (Microsoft) |
Windows Secure Kernel Development Fermin J. Serna (Microsoft) |
15:40 - 16:00
|
Coffee Break | |
16:00 - 16:50
|
Results of a security assessment of the TCP and IP protocols and common implementation strategies Fernando Gont (UK CPNI (Centre for the Protection Of National Infrastructure)) |
eKimono: detecting rootkits inside Virtual Machine Nguyen Anh Quynh (AIST) |
16:50 - 17:40
|
The Kingdom of the Blind: OSX Incident Response Morgan Marquis-Boire (Google) |
Stoned déjà vu - again Peter Kleissner (Independent Researcher) |
17:40 - 18:40
|
Night Talk: The Threat Landscape: The Reality vs. The Hype Toralv Dirro (Avert Labs EMEA, McAfee) |
#TwitterRisks: Bot C&C, Data Loss, Intel Collection & More Ben Feinstein (SecureWorks) |
20:00 - 23:59
|
Speaker's Dinner |
Day 2 - Nov 20 | Pirouette | Riding School |
---|---|---|
09:00 - 09:50
|
Attacking SMS Zane Lackey & Luis Miras (iSEC Partners) |
Weapons of Mass Pwnage: Attacking Deployment Solutions Luke Jennings (MWR InfoSecurity) |
09:50 - 10:40
|
Cracking GSM Encryption Karsten Nohl (H4RDW4RE) |
The Developmental Psychology of Intrusion Detection Systems Stefan Schumacher (Kaishakunin.com) |
10:40 - 11:00
|
Coffee Break | |
11:00 - 11:50
|
Keykeriki - Universal Wireless Keyboard Sniffing For The Masses Thorsten Schröder & Max Moser (Remote-Exploit.org) |
Exploiting Printers by Analyzing Their Firmware Daniel Fabian (SEC Consult Unternehmensberatung GmbH) |
11:50 - 12:40
|
Hijacking Mobile Data Connections 2.0: Automated and Improved Roberto Piccirillo & Roberto Gassirà (Mobile Security Lab) |
What if? Simulation of a large-scale network under attack Alexei Kachalin (Calc.Math and Cybernetics Department of Moscow State University) |
12:40 - 13:40
|
Lunch | |
13:40 - 14:30
|
Malware for SoHo Routers naxxatoe (NNC Security Research) |
Ksplice: Patch without disruption Nelson Elhage (Ksplice, Inc.) |
14:30 - 15:20
|
Malware case study: The ZeuS evolution Vicente Diaz (S21Sec) |
Building the Next IDS Engine Matt Jonkman (Open Information Security Foundation) |
15:20 - 15:40
|
Coffee Break | |
15:40 - 16:30
|
Advanced MySQL Exploitation Muhaimin Dzulfakar (Independent Security Researcher) |
Internet election for the German Bundestag Lutz Donnerhacke (IKS GmbH, Fitug e.V., Thüringen Netz, Euralo/ICANN) |
16:30 - 17:20
|
Reversing and Exploiting an Apple Firmware Update K. Chen (Georgia Tech) |
A practical DOS attack to the GSM network Dieter Spaar (Self-employed) |
17:20 - 17:40
|
Closing Ceremony | |
20:00 - ∞
|
Party & Networking at Metalab, Rathausstrasse 6, 1010 Wien |