SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2016

Jump to: navigation, search
Line 8: Line 8:
 
Currently confirmed are:<br><br>
 
Currently confirmed are:<br><br>
  
* Keynote: Memoirs of a Data Security Street Fighter by Mikko Hypponen  
+
* Keynote: [[Presentations#Memoirs_of_a_Data_Security_Street_Fighter | Memoirs of a Data Security Street Fighter by Mikko Hypponen ]]
 +
 
 
* Presentations:  
 
* Presentations:  
** Automated 0wnage with Return Oriented Programming by Erik Buchanan
+
** [[Presentations#Automated_0wnage_with_Return_Oriented_Programming | Automated 0wnage with Return Oriented Programming by Erik Buchanan]]
** CsFire: browser-enforced mitigation against CSRF by Lieven Desmet
+
** [[Presentations#CsFire:_browser-enforced_mitigation_against_CSRF | CsFire: browser-enforced mitigation against CSRF by Lieven Desmet
** Cyber [Crime|War] - connecting the dots by Ian Amit
+
** [[Presentations#Cyber_.5BCrime.7CWar.5D_-_connecting_the_dots | Cyber [Crime|War] - connecting the dots by Ian Amit]]
** Embedded System Hacking and My Plot To Take Over The World by Paul Asadoorian
+
** [[Presentations#Embedded_System_Hacking_and_My_Plot_To_Take_Over_The_World | Embedded System Hacking and My Plot To Take Over The World by Paul Asadoorian]]
** Fireshark -  A tool to Link the Malicious Web by Stephan Chenette
+
** [[Presentations#Fireshark_-__A_tool_to_Link_the_Malicious_Web | Fireshark -  A tool to Link the Malicious Web by Stephan Chenette]]
** GSM security: fact and fiction by Fabian van den Broek  
+
** [[Presentations#GSM_security:_fact_and_fiction | GSM security: fact and fiction by Fabian van den Broek ]] 
** Head Hacking – The Magic of Suggestion and Perception by Dale Pearson
+
** [[Presentations#Head_Hacking_.E2.80.93_The_Magic_of_Suggestion_and_Perception | Head Hacking – The Magic of Suggestion and Perception by Dale Pearson]]
** NFC (Near Field Communication) Malicious Content Sharing by Roel Verdult
+
** [[Presentations#NFC_Malicious_Content_Sharing | NFC (Near Field Communication) Malicious Content Sharing by Roel Verdult]]
** Project Skylab 1.0: Helping You Get Your Cloud On by Craig Balding
+
** [[Presentations#Project_Skylab_1.0:_Helping_You_Get_Your_Cloud_On | Project Skylab 1.0: Helping You Get Your Cloud On by Craig Balding]]
** The Monkey Steals the Berries: The State of Mobile Security by Tyler Shields  
+
** [[Presentations#.22The_Monkey_Steals_the_Berries.22_The_State_of_Mobile_Security | The Monkey Steals the Berries: The State of Mobile Security by Tyler Shields]]
** The WOMBAT Project: Recent Developments in Internet Threats Analysis by Olivier Thonnard and Andy Moser
+
** [[Presentations#The_WOMBAT_Project:_Recent_Developments_in_Internet_Threats_Analysis | The WOMBAT Project: Recent Developments in Internet Threats Analysis by Olivier Thonnard and Andy Moser]]
** Top 5 ways to steal a company: Forget root, I want it all. by Chris Nickerson
+
** [[Presentations#Top_5_ways_to_steal_a_company_.22Forget_root.2C_I_want_it_all.22 | Top 5 ways to steal a company: Forget root, I want it all. by Chris Nickerson]]
** You Spent All That Money And You Still Got Owned by Joseph McCray
+
** [[Presentations#You_Spent_All_That_Money_And_You_Still_Got_Owned... | You Spent All That Money And You Still Got Owned by Joseph McCray]]
** Your Project: From Idea To Reality: Make A Living Doing What You Love by Mitch Altman
+
** [[Presentations#Your_Project:_From_Idea_To_Reality_.22Make_A_Living_Doing_What_You_Love.22 | Your Project: From Idea To Reality: Make A Living Doing What You Love by Mitch Altman]]
 +
 
 
* Workshops:  
 
* Workshops:  
 
** Cryptanalysis workshop: Breaking office encryption by Eric Filiol
 
** Cryptanalysis workshop: Breaking office encryption by Eric Filiol
Line 33: Line 35:
 
** Seccubus workshop: Analyzing vulnerability assessment data the easy way by Frank Breedijk
 
** Seccubus workshop: Analyzing vulnerability assessment data the easy way by Frank Breedijk
 
** The Security Innovation Network - Cluster of Clusters by Ulrich Seldeslachts
 
** The Security Innovation Network - Cluster of Clusters by Ulrich Seldeslachts
 +
 
* Events during conference:
 
* Events during conference:
 
** [[Challenge | The Hex Factor]]  
 
** [[Challenge | The Hex Factor]]  

Revision as of 10:51, 26 May 2010

Our Call for Papers 2010 just closed. Expect a partial schedule soon!


For abstracts and details of the presentation, please check:


Currently confirmed are:

  • Workshops:
    • Cryptanalysis workshop: Breaking office encryption by Eric Filiol
    • Hardware Hacking Area: Learn To Make Cool Things With Microcontrollers! by Mitch Altman
    • Living with SELinux How to configure SELinux for your daily applications in CentOS/RHEL by Toshaan Bharvani
    • Lockpicking 101 by Walter Bergers (TOOOL.nl)
    • Malicious PDF analysis by Didier Stevens
    • RFID workshop by Philippe Teuwen
    • Seccubus workshop: Analyzing vulnerability assessment data the easy way by Frank Breedijk
    • The Security Innovation Network - Cluster of Clusters by Ulrich Seldeslachts



For more information, check our F.A.Q.

The 2009 archive with videos and presentations can be found on the 2009 wiki

or have a look at this summary video of 6m35s!!!

<videoflash>ZaG0b0SUdgk</videoflash>