– Chema Alonso – Pentesting Driven by FOCA
– Cedric Blancher – Hacking, an activity of Public interest?
– Nicolas Bareli – Sandboxing based on SECCOM for Linux kernel
– Cesar Cerrudo – Token Kidnapping\’s Revenge
– Cesar Cerrudo – History 0days, Disclosing y otras yerbas
– Claudio Criscione – Virtually Pwned: Pentesting VMware
– Giovanni Cruz – Atacking VoIP…a paradise!
– Nicolas Economou – 2×1 Microsoft Bugs: ‘Virtual PC hyper-hole-visor’ + ‘Windows Creation Vulnerability (MS10-048)’
– Gary Golomb – Network-based detection of PE structural anomalies and linker characteristics
– Michael Hudson – Wrong Way, the true story of a Black Hat
– Barnaby Jack – Jackpotting Automated Teller Machines
– Leando Meiners & Diego Sor – WPA Migration Mode: WEP is back to haunt you…
– Eric Monti – iPhone Rootkit? There’s an App for That!
– Mariano Nuñez Di Croce – SAP Backdoors: A ghost at the heart of your business
– Hernan Ochoa – Understanding the Win SMB NTLM Weak Nonce Vulnerability
– Hernan Ochoa -Transferring files on isolated remote desktop environments
– Deviant Ollam – Distinguishing Lockpicks: Raking vs Lifting vs Jiggling and More
– Alfredo Ortega & Oren Isacson – Exploiting Digital Cameras
– Andres Riancho – Lucas Apa Web Application Security Payloads
– Juliano Rizzo & Thai Duong – Padding Oracles Everywhere
– Pablo Sole – Hanging on a ROPe
– Roelf Temmingh – Your life online: No more secrets Marty
– Chris Valasek – Understanding the Low Fragmentation Heap: From Allocation to Exploitation