• 09:00
  • KEYNOTE - TAKE RISK, DON’T FAIL

    Brian Muirhead
    Thu, 09:00 - 10:00
    Roman 2
  • 10:15
  • CMX: IEEE CLEAN FILE METADATA EXCHANGE

    Mark Kennedy, Igor Muttik
    Thu, 10:15 - 10:45
    Roman 2
  • PASS-THE-HASH 2: THE ADMIN'S REVENGE

    Chris Campbell, Alva Duckwall
    Thu, 10:15 - 11:15
    Roman 4
  • ABUSING WEB APIS THROUGH SCRIPTED ANDROID APPLICATIONS

    Daniel Peck
    Thu, 10:15 - 10:45
    Roman 1 & 3
  • THE SCADA THAT DIDN'T CRY WOLF- WHO'S REALLY ATTACKING YOUR ICS DEVICES- PART DEUX!

    Kyle Wilhoit
    Thu, 10:15 - 11:15
    Palace 2
  • MOBILE ROOTKITS: EXPLOITING AND ROOTKITTING ARM TRUSTZONE

    Thomas Roth
    Thu, 10:15 - 11:15
    Palace 3
  • FULLY ARBITRARY 802.3 PACKET INJECTION: MAXIMIZING THE ETHERNET ATTACK SURFACE

    Andrea Barisani, Daniele Bianco
    Thu, 10:15 - 11:15
    Augustus 5 & 6
  • BLUETOOTH SMART: THE GOOD, THE BAD, THE UGLY, AND THE FIX!

    Mike Ryan
    Thu, 10:15 - 11:15
    Palace 1
  • HONEY, I’M HOME!! - HACKING Z-WAVE HOME AUTOMATION SYSTEMS

    Behrang Fouladi, Sahand Ghanoun
    Thu, 10:15 - 11:15
    Augustus 1 & 2
  • THE FACTORING DEAD: PREPARING FOR THE CRYPTOPOCALYPSE

    Thomas Ptacek, Tom Ritter, Javed Samuel, Alex Stamos
    Thu, 10:15 - 11:15
    Augustus 3 & 4
  • MO MALWARE MO PROBLEMS - CUCKOO SANDBOX TO THE RESCUE

    Jurriaan Bremer, Claudio Guarnieri, Mark Schloesser
    Thu, 10:15 - 12:45
    Pompeian
  • DO-IT-YOURSELF CELLULAR IDS

    Sherri Davidoff, Scott Fretheim, David Harrison
    Thu, 10:15 - 12:45
    Florentine
  • 10:45
  • MOBILE MALWARE: WHY THE TRADITIONAL AV PARADIGM IS DOOMED AND HOW TO USE PHYSICS TO DETECT UNDESIRABLE ROUTINES

    Markus Jakobsson, Guy Stewart
    Thu, 10:45 - 11:15
    Roman 2
  • BIG DATA FOR WEB APPLICATION SECURITY

    Mike Arpaia, Kyle Barry
    Thu, 10:45 - 11:15
    Roman 1 & 3
  • 11:45
  • BOCHSPWN: IDENTIFYING 0-DAYS VIA SYSTEM-WIDE MEMORY ACCESS PATTERN ANALYSIS

    Gynvael Coldwind, Mateusz Jurczyk
    Thu, 11:45 - 12:45
    Roman 2
  • ENERGY FRAUD AND ORCHESTRATED BLACKOUTS: ISSUES WITH WIRELESS METERING PROTOCOLS (WM-BUS)

    Cyrill Brunschwiler
    Thu, 11:45 - 12:45
    Roman 4
  • DISSECTING CSRF ATTACKS & COUNTERMEASURES

    Sergey Shekyan, Mike Shema, Vaagn Toukharian
    Thu, 11:45 - 12:45
    Roman 1 & 3
  • HUNTING THE SHADOWS: IN DEPTH ANALYSIS OF ESCALATED APT ATTACKS

    Ming-Chang Chiu, Tsung Pei Kan, Benson Wu, Fyodor Yarochkin
    Thu, 11:45 - 12:45
    Palace 2
  • THE OUTER LIMITS: HACKING THE SAMSUNG SMART TV

    Aaron Grattafiori, Josh Yavor
    Thu, 11:45 - 12:45
    Palace 3
  • REVEALING EMBEDDED FINGERPRINTS: DERIVING INTELLIGENCE FROM USB STACK INTERACTIONS

    Andy Davis
    Thu, 11:45 - 12:45
    Augustus 5 & 6
  • UART THOU MAD?

    Toby Kohlenberg, Mickey Shkatov
    Thu, 11:45 - 12:45
    Palace 1
  • ANDROID: ONE ROOT TO OWN THEM ALL

    Jeff Forristal
    Thu, 11:45 - 12:45
    Augustus 1 & 2
  • STEPPING P3WNS: ADVENTURES IN FULL-SPECTRUM EMBEDDED EXPLOITATION (AND DEFENSE!)

    Michael Costello, Ang Cui, Salvatore. J. Stolfo
    Thu, 11:45 - 12:45
    Augustus 3 & 4
  • 14:15
  • USING ONLINE ACTIVITY AS DIGITAL FINGERPRINTS TO CREATE A BETTER SPEAR PHISHER

    Ulisses Albuquerque, Joaquim Espinhara
    Thu, 14:15 - 15:15
    Roman 2
  • HOT KNIVES THROUGH BUTTER: BYPASSING AUTOMATED ANALYSIS SYSTEMS

    Zheng Bu, Abhishek Singh
    Thu, 14:15 - 15:15
    Roman 4
  • ABOVE MY PAY GRADE: CYBER RESPONSE AT THE NATIONAL LEVEL

    Jason Healey
    Thu, 14:15 - 15:15
    Roman 1 & 3
  • ') UNION SELECT `THIS_TALK` AS ('NEW OPTIMIZATION AND OBFUSCATION TECHNIQUES’)%00

    Richard Salgado
    Thu, 14:15 - 15:15
    Palace 2
  • OUT OF CONTROL: DEMONSTRATING SCADA DEVICE EXPLOITATION

    Eric Forner, Brian Meixell
    Thu, 14:15 - 15:15
    Palace 3
  • FUNDERBOLT: ADVENTURES IN THUNDERBOLT DMA ATTACKS

    Russ Sevinsky
    Thu, 14:15 - 15:15
    Augustus 5 & 6
  • PRESS ROOT TO CONTINUE: DETECTING OSX AND WINDOWS BOOTKITS WITH RDFU

    Tomislav Pericin, Mario Vuksan
    Thu, 14:15 - 15:15
    Palace 1
  • WHAT'S ON THE WIRE? PHYSICAL LAYER TAPPING WITH PROJECT DAISHO

    Mike Kershaw, Michael Ossmann, Dominic Spill
    Thu, 14:15 - 15:15
    Augustus 1 & 2
  • IMPLANTABLE MEDICAL DEVICES: HACKING HUMANS

    Barnaby Jack
    Thu, 14:15 - 15:15
    Augustus 3 & 4
  • NETWORK FORENSICS: SUDDEN DEATH WORKSHOP

    Scott Fretheim, Jonathan Neff
    Thu, 14:15 - 16:30
    Pompeian
  • JTAGULATOR: ASSISTED DISCOVERY OF ON-CHIP DEBUG INTERFACES

    Joe Grand
    Thu, 14:15 - 16:30
    Florentine
  • 15:30
  • CREEPYDOL: CHEAP, DISTRIBUTED STALKING

    Brendan O'Connor
    Thu, 15:30 - 16:30
    Roman 2
  • POST EXPLOITATION OPERATIONS WITH CLOUD SYNCHRONIZATION SERVICES

    Jacob Williams
    Thu, 15:30 - 16:30
    Roman 4
  • VIRTUAL DEOBFUSCATOR - A DARPA CYBER FAST TRACK FUNDED EFFORT

    Jason Raber
    Thu, 15:30 - 16:30
    Roman 1 & 3
  • IS THAT A GOVERNMENT IN YOUR NETWORK OR ARE YOU JUST HAPPY TO SEE ME?

    Eric M. Fiterman
    Thu, 15:30 - 16:30
    Palace 2
  • COMPROMISING INDUSTRIAL FACILITIES FROM 40 MILES AWAY

    Lucas Apa, Carlos Mario Penagos
    Thu, 15:30 - 16:30
    Palace 3
  • RFID HACKING: LIVE FREE OR RFID HARD

    Francis Brown
    Thu, 15:30 - 16:30
    Augustus 5 & 6
  • SSL, GONE IN 30 SECONDS - A BREACH BEYOND CRIME

    Yoel Gluck, Neal Harris, Angelo Prado
    Thu, 15:30 - 16:30
    Palace 1
  • EXPLOITING NETWORK SURVEILLANCE CAMERAS LIKE A HOLLYWOOD HACKER

    Craig Heffner
    Thu, 15:30 - 16:30
    Augustus 1 & 2
  • HACKING, SURVEILLING, AND DECEIVING VICTIMS ON SMART TV

    SeungJin Lee
    Thu, 15:30 - 16:30
    Augustus 3 & 4
  • 17:00
  • OPTIROP: HUNTING FOR ROP GADGETS IN STYLE

    Nguyen Anh Quynh
    Thu, 17:00 - 18:00
    Roman 2
  • DEFENDING NETWORKS WITH INCOMPLETE INFORMATION: A MACHINE LEARNING APPROACH

    Alex Pinto
    Thu, 17:00 - 18:00
    Roman 4
  • TERIDIAN SOC EXPLOITATION: EXPLORATION OF HARVARD ARCHITECTURE SMART GRID SYSTEMS

    Nathan Keltner, Josh Thomas
    Thu, 17:00 - 18:00
    Roman 1 & 3
  • BUGALYZE.COM - DETECTING BUGS USING DECOMPILATION AND DATA FLOW ANALYSIS

    Silvio Cesare
    Thu, 17:00 - 18:00
    Palace 2
  • HACKING LIKE IN THE MOVIES: VISUALIZING PAGE TABLES FOR LOCAL EXPLOITATION

    Alexandru Radocea, Georg Wicherski
    Thu, 17:00 - 18:00
    Palace 3
  • HOME INVASION V2.0 - ATTACKING NETWORK-CONTROLLED HARDWARE

    David Bryan, Dan Crowley, Jennifer Savage
    Thu, 17:00 - 18:00
    Augustus 5 & 6
  • MULTIPLEXED WIRED ATTACK SURFACES

    Kyle Osborn, Michael Ossmann
    Thu, 17:00 - 18:00
    Palace 1
  • OWNING THE ROUTING TABLE - PART II

    Gabi Nakibly
    Thu, 17:00 - 18:00
    Augustus 1 & 2
  • SPY-JACKING THE BOOTERS

    Lance James, Brian Krebs
    Thu, 17:00 - 18:00
    Augustus 3 & 4