Track1 Track2

10:00 - 10:45 Marcus Niemietz (Germany), "UI Redressing and Clickjacking: About click fraud and data theft" Alexey Lukatsky (Russia, Cisco), "Boston cybercrime Matrix or what is the business model of the modern hacker?"

10:45 - 11:30 Paul Volobuev, Alexander Polyakov, Alexander Minojenko (Russia,ERPScan) “Practical attacks on SCADA applications and PLC devices” Aleksandr Matrosov, Evgeny Rodionov (Russia, ESET), "Modern technologies in malware programs’ developing for RBS systems"

11:30 - 12:15 Alexey Sintsov (Russia, ERPScan), "Where do the money lie?" Andrey Beshkov (Russia, Microsoft), "Behind the Window Update Scenes. From vulnerability to patńh"

12:15 - 13:00 Fyodor Yarochkin (Taiwan, Amorize), "Dissecting unlawful Internet activities" Sergey Gordeychik (Russia, Positive Technologies), "How to hack a telecom and stay alive"

14:00 - 14:45 Philippe Langlois (France, P1sec), "3G and LTE insecurity: from the radio to the core network and protocols" Vladimir Vorontsov (Russia, ONSEC), “Splitting, smuggling and cache poisoning: come back!"

14:45 -15:30 Dmitry Schelkunov, VasilyBukasov (Russia, LETA), "About practical deobfuscation" FASTTRACK (hacking everything)

1. Alexander Polyakov (Russia, ERPScan) "Don’t touch it, unless it falls in pieces: business applications hack in extreme conditions"

2. Nikita Abdullin (Russia, Saint Petersburg State Polytechnic University), "Reverse-engineering of embedded MIPS devices. Case Study: DrayTek SOHO-class routers"

3. Dmitry Chastuhin (Russia, Saint Petersburg State Polytechnic University) "Practical attacks on Internet kiosks and payment terminals"

15:30 - 16:15 Anton Bolshakov (Singapoore, Security–, "United anti–crime. Open Systems" FASTTRACK (exploitationmethodologies)

1.Andrey Labunets (TumSU, DSecRG), "Methods of network traffic tracing for reverse engineering and vulnerability research"

2.Dmitriy "D1g1" Evdokimov (Russia, Saint Petersburg State Polytechnic University), "DBI:Intro"

3.Artyom Shishkin, "Printing interception via modifying Windows GDI"

16:15 - 16:45 Coffe-break / Lockpicking FASTTRACK

1. Alexey Krasnov (Gazinformservice), "We all meandered through our schooling haphazardly"

2.Sukhanov Maxim (Group-IB), "Fraud in RBS systems: problems, occurring during the production of judicial computer and technical expertises"

16:45 - 17:30 Nikita Tarakanov (Russia, CISS), "Kernel Pool Overflow: from Windows XP to Windows 8" FASTTRACK

1. AleksandrMatrosov, EvgenyRodionov (Russia, ESET), "Win32/Duqu: involution of Stuxnet"

2. Vladimir Kropotov (TBInform), "Drive–By–Download attack evolution before and after vulnerabilities’ publication by the information security analyst eyes."

3. Denis Baranov (Positive Technologies), "Root via XSS"

17:30 - 18:15 Ivan Medvedev (USA, Microsoft), "Security Development Lifecycle Tools" FASTTRACK (Secret talks)

1. Anton "ToXa" Karpov (Yandex) —TBA

2. Nikita Kislitsin (XAKEP Magazine) — TBA

3. Arkanoid — TBA