Presentations
Keynotes
The Grugq OPSEC: Because Jail is for wuftpd
Felix 'FX' Lindner Try Harder 2 Be Yourself
Talks
Atte Kettunen, Miaubiz Fuzzing at scale and in style
Mateusz 'j00ru' Jurczyk Windows Kernel Reference Count Vulnerabilities Case Study
Nicolas Gregoire That's why I love XML hacking!
Shay Chen The Diviner Digital Clairvoyance Breakthrough Gaining Access to the Source Code & Server Side Memory Structure of ANY Application
Aleksandr Matrosov, Eugene Rodionov Win32/Flamer: Reverse Engineering and Framework Reconstruction
Alexander Polyakov How I will break your enterprise
Alexey Troshichev MiTM attack on iOS: Methodology and consequences
Alisa Shevchenko A story about nonexistent 0-days, stable exploits for binary applications and user interactions
Andrey Belenko, Dmitry Sklyarov Dark and Bright Sides of iCloud (In)security
Andrei Costin On security aspects of ADS-B and other flying technology
Andrey Petukhov, Georgy Noseyevich No locked doors, no windows barred: hacking OpenAM infrastructure
Vladimir Vorontsov, Alexander Golovko SSRF attacks and sockets: smorgasbord of vulnerabilities
Dmytro Oleksiuk Applied anti-forensics: rootkits, kernel vulnerabilities and then some
Ivan Sorokin Mac OS X malware overview
Mikhail Fyrstov A blow against MongoDB
Nikita Abdullin Modern payments security: EMV, NFC, etc.?
Nikita Tarakanov The Art of Binary Diffing or how to find 0-dayz for free
Sergey Karasikov Android behind the scenes: possible attacks and radical defense measures
Workshops
Jean-Ian Boutin Reversing banking trojan: an in-depth look into Gataka
Michele "antisnatchor" Orru All you ever wanted to know about BeEF
Alexander Azimov, Artyom Gavrichenkov, Alexander Lyamin DDoS
Alexander Potapenko, Dmitry Vyukov Forewarned is forearmed: AddressSanitizer and ThreadSanitizer
Alexey Tyurin Exploitation of XML-based attacks
Alexey Sintsov Advanced Exploit Development (x32). Browser Edition
Arseny Reutov, Timur Yunusov, Dmitry Nagibin Random Numbers. Take Two
FastTrack
Alexander Peslyak New developments in password hashing: ROM-port-hard functions (building upon the ideas of scrypt and security through obesity)
Dmitry 'D1g1' Evdokimov Python Arsenal for RE
Dmitry 'Chipik' Chastukhin, Gleb Cherbov Where is my car dude?
Eugeny Sobolev Typical information security flaws in corporations and large enterprises
Igor Gots, Sergey Soldatov How to catch your hacker, or Makeshift security
Kirill Samosadny Mass CSRF attacks via Flash ads
Oleg Kupreev 3G modem infection
Fyodor Yarochkin, Vladimir Kropotov, Vitaly Chetvertakov Techniques of automatic malware detection system bypass: interesting examples of 2012
Organizers:
Official support:
With participation of:
Gold sponsor:
Silver sponsors:
Prizes Sponsors:
General Media Partner:
Media Partners:
Competition organizers: