CFP
AGENDA

c0c0n 2010 will run from Aug 05 through Aug 06, 2010

Day 1 - 05 Aug 2010

FROM
TO
TOPIC
BY
REMARKS
09:20
10:00
Key Note - CERT Kerala
S1
10:00
10:40
Writing x86 ShellCode & "Secure" Self Modifying code and Cross Platform Programming - A Security Angle
Praseed Pai
S2
10:40
11:00
Tea Break
11:00
12:00
VoIP Security
Mukund Krishnamurthy
S3
12:00
13:00
Concept, Methodology and Challenges in Computer Forensics
Sebastian Edassery
S4
13:00
14:00
Networking Lunch
14:00
14:50
End-point Security
Laxi Eshwari - CDAC
S5
14:50
15:40
Hacker's Profiling
Raoul Chiesa
S6
15:40
16:00
Tea Break
16:00
17:00
INAUGURATION
17:00
17:30
Forensics Challenges & Case Studies
Mr Bijumon, DySP, SIT-Hitech-Crimes, PHQ Trivandrum
S7

Day 2 - 06 Aug 2010

FROM
TO
TOPIC
BY
REMARKS
09:30
09:50
Key Note
Mr. Alok Vijayant (Director - IDG, NTRO)
S8
09:50
10:40
Client Side Exploits using PDF
Tamaghna Basu & Ankur Bhargava
S9
10:40
11:00
Tea Break
11:00
12:00
Digital Signatures and their role in ensuring security of IT systems
TCS - Lalitha Subramanian
S10
12:00
13:00
Hacking and the Law
N. S. Nappinai
S11
13:00
14:00
Networking Lunch
14:00
14:50
Cybercrime trends - A Google perspective
Nirupa Calvin, Google
S12
14:50
15:40
Mobile Security
Suhas Desai
S13
15:40
16:00
Tea Break
16:00
17:00
Building intelligence analysis systems
Fyodor
S14

Day 1 - 05 Aug 2010

FROM
TO
TOPIC
BY
REMARKS
10:00
10:40
Hackers' EcoSystem in India
Rohit Srivastava
S15
10:40
11:00
Tea Break
11:00
12:00
Cloud Computing & Security: Boon or Bane; Hype or Reality; Cloud Implementation Challenges: A Live Case Study
WhiteKnight
& Krishnakumar Kottekkat
S16
12:00
13:00
Dangers and dynamic Malware analysis
Dr Chandrasekar
S17
13:00
14:00
Networking Lunch
14:00
15:30
Horses, Rats and Bots
Jayaram Ramesh
S18
15:30
15:40
Wireless MITM
Prashant Mahajan
S19
15:40
16:00
Tea Break
16:00
17:00

Day 2 - 06 Aug 2010

FROM
TO
TOPIC
BY
REMARKS
09:50
10:40
Steganography in real life.
Vahan Markarov
S20
10:40
11:00
Tea Break
11:00
12:00
null - who and where are we?
Aseem Jakhar
S21
12:00
13:00
Last line of defense - Host Intrusion Prevention and Secure application development.
Avinash Shenoi
S22
13:00
14:00
Networking Lunch
14:00
14:30
Overview of Cyber Legal Systems in India
Sagar Rahurkar
S23
14:30
14:40
Tor on Android
Pavel Akhramchuk
S22
14:50
15:40
Code Disclosure over HTTP
Anant Kochhar
S24
16:00
17:00
Capture The Flag
Hacking Contest
Get ready for the challenging Capture the Flag Hacking Contest - conceptualized and designed all the way from Brazil.
Battle Underground - Dwitya (2.0)
Dust your debuggers, fire your live CD's, sip your coffee and Hack your way through "Battle Underground- Dwitya (2.0)" - Hacking Challenge by null.

First Prize - Free Conference pass for "nullcon Dwitay" (2011).

We are planning to give free pass as prize to whoever wins the hacking challenge.