Confidence - (25-26.05 2010 Krakow)
Language: polski | engish

Schedule

The First Day, 25 May, 2010

09:30 – 09:45 Opening Ceremony
09:45 – 10:45 Anonymity, Privacy, and Circumvention with Tor in the Real World
Jacob Appelbaum
10:50 – 11:25 Security Sucks
Eddie Schwartz
  Parallel Tracks
  Track 1 Track 2
11:35 – 12:35 General notes about exploiting Windows x64
Sebastian Fernandez
PKI is dead, long live PKI
Frank Breedijk
12:45 – 13:45 Well known vulnerabilities in human brain and behavior – common admin mistakes
Wojciech Bojdol
Don’t Touch My Winny
Joseph Moti
13:45 – 14:45 Lunch Break
14:45 – 15:25 The Four Horsemen – Malware for mobile
Axelle Apvrille
You can’t stop us: latest trends on exploit techniques
Alexey Sintsov
15:35 – 16:25 Analysis of Software Vulnerabilities
Ulascan Aytlolun
Celil ‘karak0rsan’ Ünüver
Mobile attacks and preventions – how security will change the mobile market
Tam Hanna
16:35 – 17:35 Phishing
Tomasz Sawiak
The Presence and Future of Web Attacks Multi-Layer Attacks and XSSQLI
Mario Heiderich
17:40 – 18:35 Tahoe-LAFS
Zooko Wilcox O’Hearn
Microsoft Patch Analysis
Yaniv Miron
18:45 – 19:45 Dan Kaminsky
20:00 – … Afterparty
23:00 – … Powerpoint Karaoke

The Second Day, 26 May, 2010

09:45 – 10:00 Second day opening ceremony
  Parallel Tracks
  Track 1 Track 2
10:00 – 11:00 The Data Encryption Standard (DES) – How broken is it?
David Hulton
Hacking games for fun and profits
Patryk Branicki
Michal Wiczynski
11:10 – 12:10 Web browser PKI/SSL security policy weaknesses and a potential solution
Chris Palmer
De-blackboxing of digital camera
Alexey Tikhonow
12:20 – 13:20 0-Knowledge fuzzing
Vincenzo Iozzo
(Too Much) Access Points – Exploitation Roundup
Cristofaro Mune
13:20 – 14:20 Lunch Break
14:20 – 15:20 IPv6 Security
Piotr Wojciechowski
Aurora attacks
Jesse Burns
15:30 – 16:30 We Don’t Need No Stinkin’ Badges: Hacking Electronic Door Access Controllers
Shawn Merdinger
Android Reverse Engineering – Workshop
Jesse Burns
Chris Palmer
16:40 – 17:40 Hacking Cisco Enterprise WLANs
Daniel Mende
Android Reverse Engineering – Workshop
Jesse Burns
Chris Palmer
17:50 – 18:50 Case study of recent Windows vulnerabilities
Gynvael Coldwind
Mateusz “j00ru” Jurczyk
Information Warfare in DPRK
Michael Kemp
18:50 – 19:00 The end of the conference
20:00 – Game 0ver Party