| Keynotes |
| The Grugq |
“OPSEC: Because Jail is for wuftpd” |
| Felix 'FX' Lindner |
“Try Harder 2 Be Yourself” |
| Talks |
| Atte Kettunen, Miaubiz |
“Fuzzing at scale and in style” |
| Mateusz 'j00ru' Jurczyk |
“Windows Kernel Reference Count Vulnerabilities — Case Study” |
| Nicolas Gregoire |
“That's why I love XML hacking!” |
| Shay Chen |
“The Diviner — Digital Clairvoyance Breakthrough — Gaining Access to the Source Code & Server Side Memory Structure of ANY Application” |
| Aleksandr Matrosov, Eugene Rodionov |
“Win32/Flamer: Reverse Engineering and Framework Reconstruction” |
| Alexander Polyakov |
“How I will break your enterprise” |
| Alexey Troshichev |
“MiTM attack on iOS: Methodology and consequences” |
| Alisa Shevchenko |
“A story about nonexistent 0-days, stable exploits for binary applications and user interactions” |
| Andrey Belenko, Dmitry Sklyarov |
“Dark and Bright Sides of iCloud (In)security” |
| Andrei Costin |
“On security aspects of ADS-B and other flying technology” |
| Andrey Petukhov, Georgy Noseyevich |
“ No locked doors, no windows barred: hacking OpenAM infrastructure” |
| Vladimir Vorontsov, Alexander Golovko |
“SSRF attacks and sockets: smorgasbord of vulnerabilities” |
| Dmytro Oleksiuk |
«Applied anti-forensics: rootkits, kernel vulnerabilities and then some» |
| Ivan Sorokin |
“Mac OS X malware overview” |
| Mikhail Fyrstov |
“A blow against MongoDB” |
| Nikita Abdullin |
“Modern payments security: EMV, NFC, etc.?” |
| Nikita Tarakanov |
“The Art of Binary Diffing or how to find 0-dayz for free” |
| Sergey Karasikov |
“Android behind the scenes: possible attacks and radical defense measures” |
| Workshops |
| Jean-Ian Boutin |
“Reversing banking trojan: an in-depth look into Gataka” |
| Michele "antisnatchor" Orru |
“All you ever wanted to know about BeEF” |
| Alexander Azimov, Artyom Gavrichenkov, Alexander Lyamin |
“DDoS” |
| Alexander Potapenko, Dmitry Vyukov |
“Forewarned is forearmed: AddressSanitizer and ThreadSanitizer” |
| Alexey Tyurin |
“Exploitation of XML-based attacks” |
| Alexey Sintsov |
“Advanced Exploit Development (x32). Browser Edition” |
| Arseny Reutov, Timur Yunusov, Dmitry Nagibin |
“Random Numbers. Take Two” |
| FastTrack |
| Alexander Peslyak |
“New developments in password hashing: ROM-port-hard functions (building upon the ideas of scrypt and security through obesity)” |
| Dmitry 'D1g1' Evdokimov |
“Python Arsenal for RE” |
| Dmitry 'Chipik' Chastukhin, Gleb Cherbov |
“Where is my car dude?” |
| Eugeny Sobolev |
“Typical information security flaws in corporations and large enterprises” |
| Igor Gots, Sergey Soldatov |
“How to catch your hacker, or Makeshift security” |
| Kirill Samosadny |
“Mass CSRF attacks via Flash ads” |
| Oleg Kupreev |
“3G modem infection” |
| Fyodor Yarochkin, Vladimir Kropotov, Vitaly Chetvertakov |
“Techniques of automatic malware detection system bypass: interesting examples of 2012” |