|
Track1 |
Track2 |
|
10:00 - 10:45 |
Marcus Niemietz (Germany), "UI Redressing and Clickjacking: About click fraud and data theft" |
Alexey Lukatsky (Russia, Cisco), "Boston cybercrime Matrix or what is the business model of the modern hacker?" |
|
10:45 - 11:30 |
Paul Volobuev, Alexander Polyakov, Alexander Minojenko (Russia,ERPScan) “Practical attacks on SCADA applications and PLC devices” |
Aleksandr Matrosov, Evgeny Rodionov (Russia, ESET), "Modern technologies in malware programs’ developing for RBS systems" |
|
11:30 - 12:15 |
Alexey Sintsov (Russia, ERPScan), "Where do the money lie?" |
Andrey Beshkov (Russia, Microsoft), "Behind the Window Update Scenes. From vulnerability to patńh" |
|
12:15 - 13:00 |
Fyodor Yarochkin (Taiwan, Amorize), "Dissecting unlawful Internet activities" |
Sergey Gordeychik (Russia, Positive Technologies), "How to hack a telecom and stay alive" |
|
14:00 - 14:45 |
Philippe Langlois (France, P1sec), "3G and LTE insecurity: from the radio to the core network and protocols" |
Vladimir Vorontsov (Russia, ONSEC), “Splitting, smuggling and cache poisoning: come back!" |
|
14:45 -15:30 |
Dmitry Schelkunov, VasilyBukasov (Russia, LETA), "About practical deobfuscation" |
FASTTRACK (hacking everything)
1. Alexander Polyakov (Russia, ERPScan) "Don’t touch it, unless it falls in pieces: business applications hack in extreme conditions"
2. Nikita Abdullin (Russia, Saint Petersburg State Polytechnic University), "Reverse-engineering of embedded MIPS devices. Case Study: DrayTek SOHO-class routers"
3. Dmitry Chastuhin (Russia, Saint Petersburg State Polytechnic University) "Practical attacks on Internet kiosks and payment terminals"
|
|
15:30 - 16:15 |
Anton Bolshakov (Singapoore, Security–Assessment.com), "United anti–crime. Open Systems" |
FASTTRACK (exploitationmethodologies)
1.Andrey Labunets (TumSU, DSecRG), "Methods of network traffic tracing for reverse engineering and vulnerability research"
2.Dmitriy "D1g1" Evdokimov (Russia, Saint Petersburg State Polytechnic University), "DBI:Intro"
3.Artyom Shishkin, "Printing interception via modifying Windows GDI"
|
|
16:15 - 16:45 |
Coffe-break / Lockpicking |
FASTTRACK
1. Alexey Krasnov (Gazinformservice), "We all meandered through our schooling haphazardly"
2.Sukhanov Maxim (Group-IB), "Fraud in RBS systems: problems, occurring during the production of judicial computer and technical expertises"
|
|
16:45 - 17:30 |
Nikita Tarakanov (Russia, CISS), "Kernel Pool Overflow: from Windows XP to Windows 8" |
FASTTRACK
1. AleksandrMatrosov, EvgenyRodionov (Russia, ESET), "Win32/Duqu: involution of Stuxnet"
2. Vladimir Kropotov (TBInform), "Drive–By–Download attack evolution before and after vulnerabilities’ publication by the information security analyst eyes."
3. Denis Baranov (Positive Technologies), "Root via XSS"
|
|
17:30 - 18:15 |
Ivan Medvedev (USA, Microsoft), "Security Development Lifecycle Tools" |
FASTTRACK (Secret talks)
1. Anton "ToXa" Karpov (Yandex) —TBA
2. Nikita Kislitsin (XAKEP Magazine) — TBA
3. Arkanoid — TBA
|