• Amazon ballroom, near side

  • Friday, July 27
  • Making Sense of Static - New Tools for Hacking GPS

    Colin Beighley, Fergus Noble
    Fri, 10:00 - 10:50
    Track 3
  • Can You Track Me Now? Government And Corporate Surveillance Of Mobile Geo-Location Data

    Catherine Crump, Toby Kohlenberg, Christopher Soghoian, Ashkan Soltani, Ben Wizner
    Fri, 11:00 - 12:50
    Track 3
  • Don't Stand So Close To Me: An Analysis of the NFC Attack Surface

    Charlie Miller
    Fri, 13:00 - 13:50
    Track 3
  • NFC Hacking: The Easy Way

    Eddie Lee
    Fri, 14:00 - 14:50
    Track 3
  • Attacking TPM Part 2: A Look at the ST19WP18 TPM Device

    Chris Tarnovsky
    Fri, 15:00 - 15:50
    Track 3
  • Bypassing Endpoint Security for $20 or Less

    Phil Polstra
    Fri, 16:00 - 16:50
    Track 3
  • Safes and Containers: Insecurity Design Excellence

    Tobias Bluzmanis, Matt Fiddler, Marc Weber Tobias
    Fri, 17:00 - 17:50
    Track 3
  • Saturday, July 28
  • Beyond the War on General Purpose Computing: What's Inside the Box?

    Cory Doctorow
    Sat, 10:00 - 10:50
    Track 3
  • Owning Bad Guys {And Mafia} With Javascript Botnets

    Chema Alonso, Manu
    Sat, 11:00 - 11:50
    Track 3
  • Botnets Die Hard - Owned and Operated

    Richard J. Enbody, Aditya K. Sood
    Sat, 12:00 - 12:50
    Track 3
  • Hardware Backdooring is Practical

    Jonathan Brossard
    Sat, 13:00 - 13:50
    Track 3
  • Hacking Measured Boot and UEFI

    Dan Griffin
    Sat, 14:00 - 14:50
    Track 3
  • DDoS Black and White "Kungfu" Revealed

    Alan Chung, Anthony Lai, Tony Miu, Kelvin Wong
    Sat, 15:00 - 15:50
    Track 3
  • Overwriting the Exception Handling Cache PointerDwarf Oriented Programming

    Rodrigo Rubira Branco, Sergey Bratus, James Oakley
    Sat, 16:00 - 16:50
    Track 3
  • The DCWG Debriefing - How the FBI Grabbed a Bot and Saved the Internet

    Andy Fried, Paul Vixie
    Sat, 17:00 - 17:50
    Track 3
  • Sunday, July 29
  • OPFOR 4Ever

    Tim Maletic, Christopher E. Pogue
    Sun, 10:00 - 10:50
    Track 3
  • Improving Web Vulnerability Scanning

    Dan Zulla
    Sun, 11:00 - 11:50
    Track 3
  • Post Metasploitation: Improving Accuracy and Efficiency in Post Exploitation Using the Metasploit Framework

    egyp7
    Sun, 12:00 - 12:50
    Track 3
  • Weaponizing the Windows API with Metasploit’s Railgun

    David Maloney
    Sun, 13:00 - 13:50
    Track 3
  • Kevin Poulsen Answers Your Questions

    Kevin Poulsen
    Sun, 14:00 - 14:50
    Track 3
  • Owned in 60 Seconds: From Network Guest to Windows Domain Admin

    Zack Fasel
    Sun, 15:00 - 15:50
    Track 3
  • Subterfuge: The Automated Man-in-the-Middle Attack Framework

    Christopher Shields, Matthew Toussain
    Sun, 16:00 - 16:50
    Track 3