Schedule

Registration opens at 8:00AM on Saturday 24th October.

Saturday 24 October

Time Track 1 (Event Room 1)

9:00AM

Hacking the Wireless World - Software Defined Radio Exploits
Balint Seeber

10:00AM

Purple Teaming: One year after going from full time breaker to part time fixer
Chris Gates

11:00AM

Broadcasting Your Attack: Security Testing DAB Radio In Cars
Andy Davis

12:00PM

Windows 10: 2 Steps Forward, 1 Step Back
James Forshaw

1:00PM

Ruxcon Black Bag
Lanai Bar

2:00PM

Fruit Salad, yummy yummy: An analysis of ApplePay
Peter Fillmore

3:00PM

A Peek Under The Blue Coat
Raphaël Rigo

4:00PM

Design, Implementation and Bypass of the Chain-of-trust Model of iOS
Team Pangu

5:00PM

MalwAirDrop: Compromising iDevices via AirDrop
Mark Dowd

6:00PM

Turbo Talks
Lanai Bar

7:00PM

Ruxcon Party
TBA

Track 2 (Event Room 2)

Testing TLS - How To Check If Your TLS Implementation Is Correct
Hubert Kario

A Practical Robust Mitigation and Testing Tool for Use-After-Free Vulnerabilities
Yves Younan

Automated Malware Analysis: A Behavioural Approach to Automated Unpacking
Karl Denton

Tasty Malware Analysis with T.A.C.O.: Bringing Cuckoo Reports into IDA Pro
Jason Jones

Capture The Flag
Lanai Bar LAN Area

Abusing Adobe Reader¹s JavaScript APIs
Jasiel Spelman & Matt Molinyawe

High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC
Joshua “kernelsmith” Smith

High Performance Fuzzing
Richard Johnson

VENOM
Jason Geffner

Sunday 25 October

Time Track 1 (Event Room 1)

9:00AM

Hack NFC Access Cards & Steal Credit Card Data with Android For Fun &Profit
Babil Golam Sarwar

10:00AM

SDN Security
David Jorm

11:00AM

Why Attacker's Toolsets Do What They Do
Matt McCormack

12:00PM

VoIP Wars: Destroying Jar Jar Lync
Fatih Ozavci

1:00PM

RuxLox
Lanai Bar

2:00PM

Hacked to Death
Chris Rock

3:00PM

DNS as a Defense Vector
Paul Vixie

4:00PM

Panel
Event Room 1

7:00PM

Ruxcon Afterparty
TBA

Track 2 (Event Room 2)

The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election
Vanessa Teague

Advanced SOHO Router Exploitation
Lyon Yang

Microarchitecture Independent VM Introspection
Shane Macaulay

Window Driver Attack Surface: Some New Insights
Ilja Van Sprundel

Spread Spectrum Satcom Hacking: Attacking the Globalstar SDS
Colby Moore ** BY VIDEO **

Practical Intel SMEP Bypass Techniques on Linux
Vitaly Nikolenko