{"id":44,"date":"2011-12-10T21:28:24","date_gmt":"2011-12-10T21:28:24","guid":{"rendered":"http:\/\/www.thehhd.com\/HES\/?page_id=44"},"modified":"2012-04-15T13:43:47","modified_gmt":"2012-04-15T13:43:47","slug":"schedule","status":"publish","type":"page","link":"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/schedule","title":{"rendered":"SCHEDULE"},"content":{"rendered":"<h3><strong>Conferences<\/strong><\/h3>\n<table width=\"90%\">\n<tbody>\n<tr>\n<td width=\"120\"><\/td>\n<td style=\"text-align: center;\" width=\"227\">\n<h4>Thursday 12<\/h4>\n<\/td>\n<td style=\"text-align: center;\" width=\"227\">\n<h4>Friday 13<\/h4>\n<\/td>\n<td style=\"text-align: center;\" width=\"227\">\n<h4>Saturday 14<\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<h4 style=\"margin-bottom: 0em;\">[ 09h00 &#8211; 10h00 ]<\/h4>\n<\/td>\n<td><span style=\"font-style: italic; color: #888;\">Registration<\/span><\/td>\n<td><strong><span style=\"color: #888888;\">Keynote #2, <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#FyodorYarochkin\">Fyodor Yarochkin<\/a><\/span><\/strong><\/td>\n<td><strong><span style=\"color: #888888;\">Keynote #3, <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#MarcvanHauserHeuse\">Marc &#8220;van Hauser&#8221; Heuse<\/a><\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<h4 style=\"margin-bottom: 0em;\">[ 10h00 &#8211; 11h00 ]<\/h4>\n<\/td>\n<td><span style=\"font-style: italic; color: #888;\">Registration<\/span><\/td>\n<td><strong><span style=\"color: #888888;\"><a style=\"color: #888888;\" href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/talks#Hackingthe\">Hacking the NFC credit cards for fun and debit \ud83d\ude09 <\/a> : <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#RenaudLifchitz\">Renaud Lifchitz<\/a><\/span><\/strong><\/td>\n<td><strong><span style=\"color: #888;\"><a style=\"color: #888888;\" href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/talks#RecentAdvances\">Recent Advances in IPv6 Security<\/a> : <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#FernandoGont\">Fernando Gont<\/a><\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<h4 style=\"margin-bottom: 0em;\">[ 11h00 &#8211; 12h00 ]<\/h4>\n<\/td>\n<td><span style=\"color: #808080;\"><strong><strong>Keynote #1, Cedric Blancher<\/strong><\/strong><\/span><\/td>\n<td><strong><span style=\"color: #888888;\"><a style=\"color: #888888;\" href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/talks#SecurePassword\">&#8220;Secure Password Managers&#8221; and &#8220;Military-Grade Encryption&#8221; on Smartphones: Oh Really?<\/a> : <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#AndreyBelenko\">Andrey Belenko<\/a>, <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#DmitrySklyarov\">Dmitry Sklyarov<\/a><\/span><\/strong><\/td>\n<td><strong><span style=\"color: #888888;\"><a style=\"color: #888888;\" href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/talks#Decomposingthe\">Decomposing the Network to perform Attack Planning under Uncertainty<\/a> : <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#CarlosSarraute\">Carlos Sarraute<\/a><\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<h4 style=\"margin-bottom: 0em;\">[ 12h00 &#8211; 13h30 ]<\/h4>\n<\/td>\n<td colspan=\"3\"><center><span style=\"font-style: italic; color: #888;\">Lunch<\/span><\/center><\/td>\n<\/tr>\n<tr>\n<td>\n<h4 style=\"margin-bottom: 0em;\">[ 13h30 &#8211; 14h30 ]<\/h4>\n<\/td>\n<td><strong><span style=\"color: #888888;\">Revisiting Baseband Attacks : <\/span><span style=\"color: #888888;\">Ralf Philipp Weinmann<\/span><\/strong><\/td>\n<td><strong><span style=\"color: #888888;\">\u00a0<a style=\"color: #888888;\" href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/talks#AllYour\">All Your Calls Are Still Belong to Us &#8211; How We Compromised the Cisco VoIP Crypto Ecosystem<\/a> : <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#DanielMendeandEnnoRey\">Enno Rey, Daniel Mende<\/a><\/span><\/strong><\/td>\n<td><strong><span style=\"color: #888888;\"><a style=\"color: #888888;\" href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/talks#Modernwebapp\">Modern webapp hacking or how to kill a bounty program<\/a> : <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#ItzhakAvraham\">Itzhak (Zuk) Avraham<\/a>, <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#NirGoldshlager\">Nir Goldshlager<\/a><\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<h4 style=\"margin-bottom: 0em;\">[ 14h30 &#8211; 15h30 ]<\/h4>\n<\/td>\n<td><strong><span style=\"color: #888888;\"><a style=\"color: #888888;\" href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/talks#Hardwarebackdooring\">Hardware backdooring is practical<\/a> : <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#JonathanBrossard\">Jonathan Brossard<\/a> \/ <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#FlorentinDemetrescu\">Florentin Demetrescu<\/a><\/span><\/strong><\/td>\n<td><strong><span style=\"color: #888888;\"><a style=\"color: #888888;\" href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/talks#TheSystem\">The System of Automatic Searching for Vulnerabilities or how to use Taint Analysis to find security bugs<\/a> : <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#NikitaTarakanov\">Nikita Tarakanov<\/a> &amp; Alex Bazhanyuk<\/span><\/strong><\/td>\n<td><strong><span style=\"color: #888888;\"><a style=\"color: #888888;\" href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/talks#EasyLocal\">Easy Local Windows Kernel Exploitation<\/a> : <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#CesarCerrudo\">Cesar Cerrudo<\/a><\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<h4 style=\"margin-bottom: 0em;\">[ 15h30 &#8211; 16h30 ]<\/h4>\n<\/td>\n<td><strong><span style=\"color: #888888;\"><a style=\"color: #888888;\" href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/talks#Strangeand\">Strange and Radiant Machines in the PHY Layer<\/a> : <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#TravisGoodspeed\">Travis Goodspeed<\/a> &amp; <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#SergeyBratus\">Sergey Bratus<\/a><\/span><\/strong><\/td>\n<td><strong><span style=\"color: #888888;\"><span style=\"text-decoration: underline;\">Exploiting a Coalmine: Abusing Complex Bugs in Webkit&#8217;s RenderArena\u00a0<\/span>: <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#GeorgWicherski\">Georg Wicherski<\/a><\/span><\/strong><\/td>\n<td><strong><span style=\"color: #888888;\"><a style=\"color: #888888;\" href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/talks#YoDawg\">Yo Dawg, I Heard You Like Reversing&#8230;<\/a> : <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#AaronPortnoy\">Aaron Portnoy<\/a>, <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#BrandonEdwards\">Brandon Edwards<\/a><\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<h4 style=\"margin-bottom: 0em;\">[ 16h30 &#8211; 17h30 ]<\/h4>\n<\/td>\n<td><span style=\"color: #808080;\"><strong><a style=\"color: #888888;\" href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/talks#CryptographicFunction\">Cryptographic Function Identification in Obfuscated Binary Programs<\/a> : <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#JoanCalvet\">Joan Calvet<\/a><\/strong><\/span><\/td>\n<td><strong><span style=\"color: #808080;\">Round Table : How do you manage yours &#8220;hacker&#8221; profiles ?<\/span><\/strong><\/td>\n<td><strong><strong><\/strong><\/strong><strong><span style=\"color: #888888;\">War game debriefing :<\/span>\u00a0<a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#StevenVanAcker\">Steven Van Acker<\/a>\u00a0<\/strong><strong><\/strong><strong><strong><\/strong><\/strong><span style=\"color: #888888;\"> <strong>Zero Day Show : community<\/strong><\/span><strong><\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<h4 style=\"margin-bottom: 0em;\">[ 17h30 &#8211; 18h30 ]<\/h4>\n<\/td>\n<td><span style=\"color: #808080;\"><strong>TOOOL : <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#WalterBelgers\">Walter Belgers<\/a><\/strong><\/span><\/td>\n<td><strong><span style=\"color: #888888;\">Social Engineering :<\/span>\u00a0<a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#MatiasBrutti\">Matias Brutti<\/a><\/strong><\/td>\n<td><span style=\"color: #888888;\"><strong>Round Table<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Workshops<\/h3>\n<table>\n<tbody>\n<tr>\n<td><strong>Lockpicking<\/strong><\/td>\n<td><strong><span style=\"color: #888;\">Workshop by Toool : <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#WalterBelgers\">Walter Belgers<\/a><\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Social Engineering<\/strong><\/td>\n<td><strong><span style=\"color: #888;\">Workshop &#8211; IOActive : <a href=\"http:\/\/2012.hackitoergosum.org\/blog\/schedule\/speakers#MatiasBrutti\">Matias Brutti<\/a><\/span><\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Parties<\/h3>\n<table>\n<tbody>\n<tr>\n<td><\/td>\n<td>Thursday 12<\/td>\n<td style=\"text-align: center;\">Friday 13<\/td>\n<td style=\"text-align: center;\">Saturday 14<\/td>\n<\/tr>\n<tr>\n<td>Party<\/td>\n<td><span style=\"color: #888;\">TBD<\/span><\/td>\n<td><strong><span style=\"color: #888;\">Social Network (Sponsored by\u00a0<a href=\"http:\/\/www.qualys.com\">QUALYS<\/a>)<\/span><\/strong><\/td>\n<td><strong><span style=\"color: #888;\">End of Hackito Party<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td>Place<\/td>\n<td><span style=\"color: #888;\">SVC Summit<\/span><\/td>\n<td><span style=\"font-style: italic; color: #888;\">During conference<\/span><\/td>\n<td><span style=\"font-style: italic; color: #888;\">During conference<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conferences Thursday 12 Friday 13 Saturday 14 [ 09h00 &#8211; 10h00 ] Registration Keynote #2, Fyodor Yarochkin Keynote #3, Marc &#8220;van Hauser&#8221; Heuse [ 10h00 &#8211; 11h00 ] Registration Hacking the NFC credit cards for fun and debit \ud83d\ude09 : Renaud Lifchitz Recent Advances in IPv6 Security : Fernando Gont [ 11h00 &#8211; 12h00 ] [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":10,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-44","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/pages\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/comments?post=44"}],"version-history":[{"count":10,"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/pages\/44\/revisions"}],"predecessor-version":[{"id":312,"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/pages\/44\/revisions\/312"}],"up":[{"embeddable":true,"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/pages\/10"}],"wp:attachment":[{"href":"http:\/\/2012.hackitoergosum.org\/blog\/wp-json\/wp\/v2\/media?parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}