• Brasilia ballroom, next to CTF

  • Friday, July 27
  • Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole

    Ang Cui
    Fri, 10:00 - 10:20
    Track 4 / Turbo
  • APK File Infection on an Android System

    Bob Pan
    Fri, 10:30 - 10:50
    Track 4 / Turbo
  • Passive Bluetooth Monitoring in Scapy

    Ryan Holeman
    Fri, 11:00 - 11:20
    Track 4 / Turbo
  • Not-So-Limited Warranty: Target Attacks on Warranties for Fun and Profit

    Darkred
    Fri, 11:30 - 11:50
    Track 4 / Turbo
  • Not So Super Notes, How Well Does US Dollar Note Security Prevent Counterfeiting?

    Matthew Duggan
    Fri, 12:00 - 12:20
    Track 4 / Turbo
  • The Open Cyber Challenge Platform

    Linda C. Butler
    Fri, 12:30 - 12:50
    Track 4 / Turbo
  • How to Channel Your Inner Henry Rollins

    Alberto García Illera, Jayson E. Street
    Fri, 13:00 - 13:20
    Track 4 / Turbo
  • Bad (and Sometimes Good) Tech Policy: It's Not Just a DC Thing

    Chris Conley
    Fri, 13:30 - 13:50
    Track 4 / Turbo
  • Scylla: Because There's no Patch for Human Stupidity

    Carlos Alberto Rodriguez, Sergio Valderrama
    Fri, 14:00 - 14:20
    Track 4 / Turbo
  • Drinking From the Caffeine Firehose We Know as Shodan

    Dan Tentler
    Fri, 14:30 - 14:50
    Track 4 / Turbo
  • Network Anti-Reconnaissance: Messing with Nmap Through Smoke and Mirrors

    Dan Petro
    Fri, 15:00 - 15:20
    Track 4 / Turbo
  • How to Hack VMware vCenter Server in 60 Seconds

    Alexander Minozhenko
    Fri, 15:30 - 15:50
    Track 4 / Turbo
  • Demorpheus: Getting Rid Of Polymorphic Shellcodes In Your Network

    Svetlana Gaivoronski, Dennis Gamayunov
    Fri, 16:00 - 16:20
    Track 4 / Turbo
  • New Techniques in SQLi Obfuscation: SQL never before used in SQLi

    Nick Galbreath
    Fri, 16:30 - 16:50
    Track 4 / Turbo
  • DivaShark - Monitor your Flow

    Robert Deaton
    Fri, 17:00 - 17:20
    Track 4 / Turbo
  • Blind XSS

    Adam Baldwin
    Fri, 17:30 - 17:50
    Track 4 / Turbo
  • Saturday, July 28
  • Creating an A1 Security Kernel in the 1980s (Using “Stone Knives and Bear Skins”)

    Tom Perrine
    Sat, 10:00 - 10:50
    Track 4 / Turbo
  • Exploit Archaeology: Raiders of the Lost Payphones

    Josh Brashars
    Sat, 11:00 - 11:50
    Track 4 / Turbo
  • Into the Droid: Gaining Access to Android User Data

    Thomas Cannon
    Sat, 12:00 - 12:50
    Track 4 / Turbo
  • Hellaphone: Replacing the Java in Android

    John Floren
    Sat, 13:00 - 13:50
    Track 4 / Turbo
  • Off-Grid Communications with Android: Meshing the Mobile World

    Jeff Robble, Josh Thomas
    Sat, 14:00 - 14:50
    Track 4 / Turbo
  • Exchanging Demands

    Peter Hannay
    Sat, 15:00 - 15:50
    Track 4 / Turbo
  • Spy vs Spy: Spying on Mobile Device Spyware

    Michael Robinson, Chris Taylor
    Sat, 16:00 - 16:50
    Track 4 / Turbo
  • The Darknet of Things, Building Sensor Networks That Do Your Bidding

    Anch, Omega
    Sat, 17:00 - 17:50
    Track 4 / Turbo
  • Sunday, July 29
  • We Have You by the Gadgets

    Toby Kohlenberg, Mickey Shkatov
    Sun, 10:00 - 10:50
    Track 4 / Turbo
  • No More Hooks: Detection of Code Integrity Attacks

    Corey Kallenberg, Xeno Kovah
    Sun, 11:00 - 11:50
    Track 4 / Turbo
  • Owning the Network: Adventures in Router Rootkits

    Michael Coppola
    Sun, 12:00 - 12:50
    Track 4 / Turbo
  • Hacking [Redacted] Routers

    FX, Greg
    Sun, 13:00 - 13:50
    Track 4 / Turbo
  • SQL Injection to MIPS Overflows: Rooting SOHO Routers

    Zachary Cutlip
    Sun, 14:00 - 14:50
    Track 4 / Turbo
  • bbqSQL - Rapid Blind SQL Injection Exploitation

    Scott Behrens, Ben Toews
    Sun, 15:00 - 15:50
    Track 4 / Turbo
  • SQL ReInjector - Automated Exfiltrated Data Identification

    Andrea London, Jason A. Novak
    Sun, 16:00 - 16:50
    Track 4 / Turbo