Real time evaluation of national network exposure to emerging threats - fyodor yarochkin
Public exploit held private – penetration testing the researcher’s way tamaghna basu
New and improved hacking oracle from web apps sumit sidharth
Mobile application security – effective methodology, efficient testing! hemil shah
International approaches to critical information infrastructure protection jim clarke
Getting the end point security right! - k. k. mookhey
From app sec to malsec malware hooked, criminal crooked alok gupta
Find me if you can – smart fuzzing and discovery! shreeraj shah
The magic of passive web vulnerability analysis lava kumar