Zakład Wodociągowy w Bielanach
speakers
partners
Leading world-class specialists, two days of lectures presenting previously unrevealed research results, several hundred participants and specialized workshops - all at the CONFidence international conference, May 24-25, 2011 in Krakow!
CONFidence is much more than just a conference, it also includes professional workshops, discussion panels, staying in Hackers 'Squad Hostel, Hackers' contests, Hackers for Charity Roulette, and much more.
It is also an opportunity to talk to other specialists in this elite industry in the relaxed atmosphere of an evening conference event.
CONFidence gathered nearly 500 participants: IT security specialists from the government, industry, banking sector and academic circles as well as scientists and software developers.
CONFidence is a meeting place for the security community from all over Europe and beyond.
Dzień pierwszy, 24 Maja 2011> | ||
---|---|---|
09:00 – 10:00 | Rejestracja | |
10:00 – 10:10 | Rozpoczęcie konferencji | |
10:10 – 11:00 | Deviant Ollam, Babak Javadi Your Network Security Starts at Layer Zero | |
Sesje równoległe | ||
Sala 1 | Sala 2 | |
11:10 – 12:10 | Sandy ‘Mouse’ Clark, Brad ‘Renderman’ Haines Familiarity breeds contempt | Raoul ChiesaThe Son of Stuxnet aka “the very next scenarios” |
12:20 – 13:20 | Przerwa obiadowa | |
13:20 – 14:20 | Panel Dyskusyjny – David vs Goliat - jak zgłosić podatność i nie zrobić sobie przy tym Krzywdy. | Lightning Talks |
14:20 – 15:20 | Felix ‘FX’ Lindner – Building Custom Disassemblers | Mario Heiderich – The forbidden image – Security impact of Scalable Vector Graphics on the WWW |
15:30 – 16:00 | Piotr Linke | Maciej Rzehak – Dedicated DDoS detection and mitigation system. Arbor TMS |
16:10 – 17:10 | Andreas Bogk – The Future of Defense: Why we will have more secure computers – tomorrow | |
17:20 – 18:20 | Gregor Kopf – Non-Obvious Bugs by Example | Jim Geovedi – Hacking a Bird in the Sky: The Revenge of Angry Birds |
21:00 – … | Afterparty |
Dzień drugi, 25 Maja 2011 | ||
---|---|---|
09:00 – 10:00 | Otwarcie miejsca konferencji | |
Sesje równoległe | ||
Sala 1 | Sala 2 | |
10:00 – 11:00 | Chris Valasek Modern Heap Exploitation using the Low Fragmentation Heap | Marcus Niemietz UI Redressing: Attacks and Countermeasures Revisted |
11:10 – 12:10 | Alexey Sintsov DNS for evil | Błażej Miga, Jakub Maslowski Anonimowość – Świety Graal internetu |
12:20 – 13:20 | Michele Orru Dr. Strangelove or: How I Learned to Stop Worrying and Love the BeEF | Tom Keetch Escaping From Microsoft Windows Sandboxes |
13:20 – 14:20 | Przerwa obiadowa | |
14:20 – 15:20 | Aleksandr Matrosov, Eugene Rodionov Defeating x64: The Evolution of the TDL Rootkit | Mario Heiderich Locking the Throne Room – ECMA Script 5, a frozen DOM and the eradication of XSS |
15:30 – 16:30 | Michał Sajdak – Remote rootshell on a Cisco router (former Linksys) - unauthenticated access. | Krzysztof Konkowski – IPv6 Security demonstration. |
16:40 – 17:10 | Travis Goodspeed – Practical attacks on the Freescale MC13224 ZigBee SoP. | |
17:10 –17:30 | Zakończenie konferencji | |
20:00 – … | Chill out party |