DEF
CON Nine Schedule
Here is the
map of where things are.
|
|||
|
|||
13:00 - 22:00 |
Bar and the hang out area opens |
||
|
|||
|
|
|
|
10:00 - 10:50 | Biing Jong Lin, Chieh Chun Lin, Jan Che Su: A Survey of Country-Wide Web Server Security | William L. Tafoya: | Freaky: OS/X and Macintosh Security |
11:00 - 11:50 | Jason Peel: Cypherpunk Grade Covert Network Channels | Bruce Schneier: Bruce Schneier Answers Questions | Sharad:
Security & Privacy (an introduction to some interesting
concepts) |
12:00 - 12:50 | FX: Attacking control, routing, and tunneling protocols | James Bamford: Researching Secrets (Book signing right after) | Shatter: FAQ The newbies: Information for people new to security, hacking or Defcon |
13:00 - 13:50 | Mark Grimes: TCP/IP Intelligent Agents: The Future of Electronic Warfare and Defense | Simple Nomad: Widdershins: De-evolution and the Politics of Technology | Dennis Salguero: The business side of starting your own consulting firm and how they can succeed |
14:00 - 14:50 | ph0tek: Writing Back Doors | Kevin McPeake & Chris Goggans: Falling Dominos | Robert Graham: Principles of Cyber Anarchy |
15:00 - 15:50 | TechnoDragon: Hardware mods, how to look for them | Barry J. Stiefel: NAT For Newbies and Not-So-Newbies: A Tutorial | |
16:00 - 16:50 | Raven Alder: A Perl script that tracks Denial of Service attacks across Cisco backbones | Marcus Andersson: Firewalling wireless devices | |
17:00 - 17:50 |
|
||
18:00 - 18:50 | Adam Bresson: Data Mining with PHP | Stephen Hsu: Triangle Boy: IP spoofing and strong encryption in service of a free Internet |
'till 6AM |
19:00 - 19:50 | Nick Farr: Designing Secure Interfaces "for Dummies" |
|
|
20:00 - 20:50 | White Knight: Internet Video Surveillance | ||
21:00 - 21:50 | Movie: Cyber Traq | ||
22:00 - 22:50 | |||
23:00 - 23:50 | Haxor Jeopardy Round 1 | ||
00:00 - 00:50 | |||
01:00 - 01:50 | |||
|
|||
|
|
|
|
10:00 - 10:50 | Optyx: KIS - Kernel Intrusion System | Daniel J. Burroughs: Applying Information Warfare theory to generate a higher level of knowledge from current IDS | Dr. Cyrus Peikari: An open-source, international, attenuated computer virus |
11:00 - 11:50 | Bruce Potter & Adam: The Captive Portal | Dr. Ian Goldberg: Arranging an Anonymous Rendezvous: Privacy Protection for Internet Servers | Lile Elam: Renagade wireless networks: Creating Connectivity on Demand! |
12:00 - 12:50 | Ofir Arkin: Introducing X - Playing Tricks with ICMP | Jay Beale: Attacking & Securing Red Hat AKA How Effective Has Bastille Linux Been? | Len Sassaman: What is SSL, a CA and FreeCert? |
13:00 - 13:50 | Robert Grill, Michael Cohen: Windows NT and Novell Host Based Intrusion Detection Using Native Logging and 3rd Party Log Reporting Tools | Thor: Grabbing User Credentials via W2k ODBC Libraries | Dario D. Diaz: Digital Millennium Copyright Act |
14:00 - 14:50 | D-Krypt: Web Aplication Security | cDc: Hacktavism Panel | John
Q. Newman: How
background investigations are conducted & how they can be defeated |
15:00 - 15:50 | Halvar Flake: Reverse Engeneering | Jim Christy: Meet the FED Panel | Michael Wilson: Hacker Doctrine in Information Warfare |
16:00 - 16:50 | Thomas J. Munn: Using Open BSD, snort, Linux, and a few other tricks to set up a transparent, ACTIVE Ids | Bryan Glancey: Weakest Link | The Defendant: So you got your lame ass sued: A legal narrative |
17:00 - 17:50 |
|
||
18:00 - 18:50 | K2: Polymorphic shellcode API | Peter Shipley: 802.11b War Driving |
|
19:00 - 19:50 | Rob Shein: Evaluating VPN Solutions | Enrique Sanchez: Distributed Intrusion Detection System Evasion | |
20:00 - 20:50 |
|
|
|
21:00 - 21:50 | |||
22:00 - 22:50 |
|
'till 6AM |
|
23:00 - 23:50 |
|
||
00:00 - 00:50 | |||
01:00 - 01:50 | |||
|
|||
|
|
|
|
10:00 - 10:50 | Anders Ingeborn: Designing small payloads | Richard Thieme: Hacking a Trans-Planetary Net: The Essence of Hacking in a Context of Pan-global Culture, the Wetware / dryware Interface, and Going to Europa | David Gessel: Intro to Quantum Cryptography |
11:00 - 11:50 | Robert Muncy: Securing Cisco Routers | Brenno de Winter: IP V6 Security | Jennifer Granick: European Cybercrime treaty |
12:00 - 12:50 | Phil King: 8 Bits and 8 Pins: More Fun With Micro controller Hacking | Keith Nugent: Windows 2000 Security: How to lock down your Win2k boxes | Ryan Lackey: HavenCo |
13:00 - 13:50 | Dan Kaminsky: Gateway Cryptography: Hacking Impossible Tunnels Through Improbable Networks with OpenSSH and the GNU Privacy Guard | John L. Dodge & Bernadette H. Schell: Laurentian University Hacker Study Update | |
14:00 - 14:50 | Dmitry Sklyarov & Andy Malyshev: eBooks security – theory and practice | HC: NTFS Alternate Data Streams | Dan Moniz: The Impact of P2P on Security in the Enterprise |
15:00 - 15:50 | DEF CON Awards Ceremony: CTF, Scavenger Hunt, Coffee Wars & Social Engineering Contest Prizes Awarded. | ||
16:00 - 16:50 |
|
||