• Wednesday, July 25
  • SEXYDEFENSE - MAXIMIZING THE HOME-FIELD ADVANTAGE

    Iftach Ian Amit
    Wed, 10:15 - 11:15
    Palace III - Defense
  • EXPLOITING THE JEMALLOC MEMORY ALLOCATOR: OWNING FIREFOX'S HEAP

    Patroklos Argyroudis, Chariton Karamitas
    Wed, 11:45 - 12:45
    Palace III - Breaking Things
  • THE INFO LEAK ERA ON SOFTWARE EXPLOITATION

    Fermin J. Serna
    Wed, 14:15 - 15:15
    Palace III - Breaking Things
  • ARE YOU MY TYPE? - BREAKING .NET SANDBOXES THROUGH SERIALIZATION

    James Forshaw
    Wed, 15:30 - 16:30
    Palace III - Breaking Things
  • PINPADPWN

    Nils, Rafael Dominguez Vega
    Wed, 17:00 - 18:00
    Palace III - Big Picture
  • Thursday, July 26
  • IOS SECURITY

    Dallas De Atley
    Thu, 10:15 - 11:15
    Palace III - Over the Air and In The Device
  • IOS KERNEL HEAP ARMAGEDDON REVISITED

    Stefan Esser
    Thu, 11:45 - 12:45
    Palace III - Over the Air and In The Device
  • WHEN SECURITY GETS IN THE WAY: PENTESTING MOBILE APPS THAT USE CERTIFICATE PINNING

    Alban Diquet, Justine Osborne
    Thu, 14:15 - 14:35
    Palace III - Over the Air and In The Device
  • EMBEDDED DEVICE FIRMWARE VULNERABILITY HUNTING USING FRAK

    Ang Cui
    Thu, 14:35 - 14:55
    Palace III - Over the Air and In The Device
  • MAPPING AND EVOLUTION OF ANDROID PERMISSIONS

    Zach Lanier, Andrew Reiter
    Thu, 14:55 - 15:15
    Palace III - Over the Air and In The Device
  • IOS APPLICATION SECURITY ASSESSMENT AND AUTOMATION: INTRODUCING SIRA

    Joshua Dubik, Justin Engler, Seth Law, David Vo
    Thu, 15:30 - 16:30
    Palace III - Over the Air and In The Device
  • HOW MANY BRICKS DOES IT TAKE TO CRACK A MICROCELL?

    Mathew Rowley
    Thu, 17:00 - 18:00
    Palace III - Over the Air and In The Device