Time |
Thread-1 |
Thread-2 |
0930-1000 |
Registration & Breakfast |
1000-1030 |
Welcome Note By
Rohit
Srivastwa |
1030-1130 |
Rahul
Analysis of Adversarial Code: The Role of Malware Kits! |
Sunil
Backdoor 2.0: Hacking one's Firefox to steal his web secrets. |
1130-1230
|
Chetan
Mining Digital Evidence in Microsoft Windows – Answering
Who, When, Why and How |
Amish
&
Umesh
The future of automated web application testing |
1230-1330 |
Rohas
7 years of Indian IT act - 7 Best Cases |
David
Faster PwninG Assured: Cracking Crypto with FPGAs |
1330-1430 |
LUNCH |
1430-1530
|
Dror
Crazy Toaster: Can Home Devices turn against us? |
Ajit
Legiment Techniques of IPS/IDS Evasion |
1530-1630 |
Varun
Subtle Security flaws: Why you must follow the basic
principles of software security |
Shreeraj
Hacking Web 2.0 Art and Science of Vulnerability Detection |
1630-1730 |
Gaurav
Vulnerabilities in VoIP Products and Services |
Panel Discussion with Lawyers, Hackers, and
Cops |
1730-1800 |
Goodbye! |
|
|
|
Tracks Legend
proActive: Learn to be safe |
hActive: Learn to hack |
reActive: Learn to investigate |
|
|
|