SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Schedule"

Difference between revisions of "Schedule"

From BruCON 2017

Jump to: navigation, search
Line 7: Line 7:
 
* Presentations:  
 
* Presentations:  
 
** [[Presentations#Automated_0wnage_with_Return_Oriented_Programming | Automated 0wnage with Return Oriented Programming by Erik Buchanan]]
 
** [[Presentations#Automated_0wnage_with_Return_Oriented_Programming | Automated 0wnage with Return Oriented Programming by Erik Buchanan]]
 +
**[[Presentations#Creating_a_CERT_at_WARP_Speed:_How_To_Fast_Track_the_Implementation_of_Your_CERT |  Creating a CERT at WARP Speed: How To Fast Track the Implementation of Your CERT by Brian Honan]]
 
** [[Presentations#CsFire:_browser-enforced_mitigation_against_CSRF | CsFire: browser-enforced mitigation against CSRF by Lieven Desmet]]
 
** [[Presentations#CsFire:_browser-enforced_mitigation_against_CSRF | CsFire: browser-enforced mitigation against CSRF by Lieven Desmet]]
 
** [[Presentations#Cyber_.5BCrime.7CWar.5D_-_connecting_the_dots | Cyber [Crime|War] - connecting the dots by Ian Amit]]
 
** [[Presentations#Cyber_.5BCrime.7CWar.5D_-_connecting_the_dots | Cyber [Crime|War] - connecting the dots by Ian Amit]]
 
** [[Presentations#Embedded_System_Hacking_and_My_Plot_To_Take_Over_The_World | Embedded System Hacking and My Plot To Take Over The World by Paul Asadoorian]]
 
** [[Presentations#Embedded_System_Hacking_and_My_Plot_To_Take_Over_The_World | Embedded System Hacking and My Plot To Take Over The World by Paul Asadoorian]]
 +
** [[Presentations#Finding_Backdoors_in_Code | Finding Backdoors in Code : The insider attack by Matias Madou]]
 
** [[Presentations#Fireshark_-__A_tool_to_Link_the_Malicious_Web | Fireshark -  A tool to Link the Malicious Web by Stephan Chenette]]
 
** [[Presentations#Fireshark_-__A_tool_to_Link_the_Malicious_Web | Fireshark -  A tool to Link the Malicious Web by Stephan Chenette]]
 
** [[Presentations#GSM_security:_fact_and_fiction | GSM security: fact and fiction by Fabian van den Broek ]]   
 
** [[Presentations#GSM_security:_fact_and_fiction | GSM security: fact and fiction by Fabian van den Broek ]]   
Line 24: Line 26:
 
* Workshops:  
 
* Workshops:  
 
** [[Workshops#Cryptanalysis_workshop:_Breaking_office_encryption | Cryptanalysis workshop: Breaking office encryption by Eric Filiol]]
 
** [[Workshops#Cryptanalysis_workshop:_Breaking_office_encryption | Cryptanalysis workshop: Breaking office encryption by Eric Filiol]]
 +
**[[Workshops#Damn_Vulnerable_Linux | Damn_Vulnerable_Linux by Ryan Dewhurst]]
 
** [[Workshops#Hardware_Hacking_Area:_Learn_To_Make_Cool_Things_With_Microcontrollers.21 | Hardware Hacking Area: Learn To Make Cool Things With Microcontrollers! by Mitch Altman]]
 
** [[Workshops#Hardware_Hacking_Area:_Learn_To_Make_Cool_Things_With_Microcontrollers.21 | Hardware Hacking Area: Learn To Make Cool Things With Microcontrollers! by Mitch Altman]]
 
**[[Workshops#Living_with_SELinux_How_to_configure_SELinux_for_your_daily_applications_in_CentOS.2FRHEL | Living with SELinux How to configure SELinux for your daily applications in CentOS/RHEL by Toshaan Bharvani]]
 
**[[Workshops#Living_with_SELinux_How_to_configure_SELinux_for_your_daily_applications_in_CentOS.2FRHEL | Living with SELinux How to configure SELinux for your daily applications in CentOS/RHEL by Toshaan Bharvani]]

Revision as of 10:35, 22 June 2010

List of confirmed presentations and workshops below. More to follow soon. Expect a full schedule by summer!

Currently confirmed are:


For abstracts and details of the presentation, please check:



For more information, check our F.A.Q.

The 2009 archive with videos and presentations can be found on the 2009 wiki

or have a look at this summary video of 6m35s!!!

<videoflash>ZaG0b0SUdgk</videoflash>