Registration opens at 8:00AM on Saturday 24th October.
Saturday 24 October
Time | Track 1 (Event Room 1) | ||
---|---|---|---|
9:00AM |
Hacking the Wireless World - Software Defined Radio ExploitsBalint Seeber |
||
10:00AM |
Purple Teaming: One year after going from full time breaker to part time fixerChris Gates |
||
11:00AM |
Broadcasting Your Attack: Security Testing DAB Radio In CarsAndy Davis |
||
12:00PM |
Windows 10: 2 Steps Forward, 1 Step BackJames Forshaw |
||
1:00PM |
Ruxcon Black BagLanai Bar |
||
2:00PM |
Fruit Salad, yummy yummy: An analysis of ApplePayPeter Fillmore |
||
3:00PM |
A Peek Under The Blue CoatRaphaël Rigo |
||
4:00PM |
Design, Implementation and Bypass of the Chain-of-trust Model of iOSTeam Pangu |
||
5:00PM |
|||
6:00PM |
Turbo TalksLanai Bar |
||
7:00PM |
Ruxcon PartyTBA |
Track 2 (Event Room 2) | |||
---|---|---|---|
Testing TLS - How To Check If Your TLS Implementation Is CorrectHubert Kario |
|||
A Practical Robust Mitigation and Testing Tool for Use-After-Free VulnerabilitiesYves Younan |
|||
Automated Malware Analysis: A Behavioural Approach to Automated UnpackingKarl Denton |
|||
Tasty Malware Analysis with T.A.C.O.: Bringing Cuckoo Reports into IDA ProJason Jones |
|||
Capture The FlagLanai Bar LAN Area |
|||
Abusing Adobe Reader¹s JavaScript APIsJasiel Spelman & Matt Molinyawe |
|||
High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CECJoshua “kernelsmith” Smith |
|||
High Performance FuzzingRichard Johnson |
|||
VENOMJason Geffner |
Sunday 25 October
Time | Track 1 (Event Room 1) | ||
---|---|---|---|
9:00AM |
Hack NFC Access Cards & Steal Credit Card Data with Android For Fun &ProfitBabil Golam Sarwar |
||
10:00AM |
SDN SecurityDavid Jorm |
||
11:00AM |
Why Attacker's Toolsets Do What They DoMatt McCormack |
||
12:00PM |
VoIP Wars: Destroying Jar Jar LyncFatih Ozavci |
||
1:00PM |
RuxLoxLanai Bar |
||
2:00PM |
Hacked to DeathChris Rock |
||
3:00PM |
DNS as a Defense VectorPaul Vixie |
||
4:00PM |
PanelEvent Room 1 |
||
7:00PM |
Track 2 (Event Room 2) | ||
---|---|---|
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online ElectionVanessa Teague |
||
Advanced SOHO Router ExploitationLyon Yang |
||
Microarchitecture Independent VM IntrospectionShane Macaulay |
||
Window Driver Attack Surface: Some New InsightsIlja Van Sprundel |
||
Spread Spectrum Satcom Hacking: Attacking the Globalstar SDSColby Moore ** BY VIDEO ** |
||
Practical Intel SMEP Bypass Techniques on LinuxVitaly Nikolenko |