• 09:00
  • CYBERSECURITY AS REALPOLITIK

    Dan Geer
    Wed, 09:00 - 10:00
    Mandalay Bay D
  • 10:15
  • CELLULAR EXPLOITATION ON A GLOBAL SCALE: THE RISE AND FALL OF THE CONTROL PROTOCOL

    Marc Blanchou, Mathew Solnik
    Wed, 10:15 - 11:15
    Lagoon K
  • DIGGING FOR IE11 SANDBOX ESCAPES

    James Forshaw
    Wed, 10:15 - 11:15
    South Seas GH
  • EVASION OF HIGH-END IPS DEVICES IN THE AGE OF IPV6

    Antonios Atlasis, Enno Rey
    Wed, 10:15 - 10:45
    South Seas CD
  • PIVOTING IN AMAZON CLOUDS

    Andres Riancho
    Wed, 10:15 - 11:15
    South Seas AB
  • PREVALENT CHARACTERISTICS IN MODERN MALWARE

    Gabriel Negreira Barbosa, Rodrigo Rubira Branco
    Wed, 10:15 - 11:15
    South Seas E
  • REVERSE ENGINEERING FLASH MEMORY FOR FUN AND BENEFIT

    Jeongwook Oh
    Wed, 10:15 - 11:15
    Jasmine Ballroom
  • SECSI PRODUCT DEVELOPMENT: TECHNIQUES FOR ENSURING SECURE SILICON APPLIED TO OPEN-SOURCE VERILOG PROJECTS

    Joe FitzPatrick
    Wed, 10:15 - 11:15
    South Seas IJ
  • THE BEAST WINS AGAIN: WHY TLS KEEPS FAILING TO PROTECT HTTP

    Antoine Delignat-Lavaud
    Wed, 10:15 - 11:15
    Mandalay Bay D
  • THE LIBRARY OF SPARTA

    Greg Conti, Tom Cross, David Raymond
    Wed, 10:15 - 11:15
    South Seas F
  • API SECURITY ROUNDTABLE: LESSONS LEARNED IN API SECURITY

    Zane Lackey
    Wed, 10:15 - 11:15
    Palm A
  • 10:50
  • ATTACKING MOBILE BROADBAND MODEMS LIKE A CRIMINAL WOULD

    Andreas Lindh
    Wed, 10:50 - 11:15
    South Seas CD
  • 11:45
  • A SURVEY OF REMOTE AUTOMOTIVE ATTACK SURFACES

    Charlie Miller, Christopher Valasek
    Wed, 11:45 - 12:45
    Lagoon K
  • HOW TO WEAR YOUR PASSWORD

    Markus Jakobsson
    Wed, 11:45 - 12:15
    South Seas CD
  • BRINGING SOFTWARE DEFINED RADIO TO THE PENETRATION TESTING COMMUNITY

    Jonathan-Christofer Demay, Arnaud Lebrun, Jean-Michel Picod
    Wed, 11:45 - 12:45
    South Seas AB
  • CLOUDBOTS: HARVESTING CRYPTO COINS LIKE A BOTNET FARMER

    Rob Ragan, Oscar Salazar
    Wed, 11:45 - 12:45
    South Seas E
  • FULL SYSTEM EMULATION: ACHIEVING SUCCESSFUL AUTOMATED DYNAMIC ANALYSIS OF EVASIVE MALWARE

    Christopher Kruegel
    Wed, 11:45 - 12:45
    Jasmine Ballroom
  • WINDOWS KERNEL GRAPHICS DRIVER ATTACK SURFACE

    Ilja van Sprundel
    Wed, 11:45 - 12:45
    South Seas IJ
  • MY GOOGLE GLASS SEES YOUR PASSWORDS!

    Xinwen Fu, Zhen Ling, Qinggang Yue
    Wed, 11:45 - 12:15
    Mandalay Bay D
  • NETWORK ATTACHED SHELL: N.A.S.TY SYSTEMS THAT STORE NETWORK ACCESSIBLE SHELLS

    Jacob Holcomb
    Wed, 11:45 - 12:45
    South Seas F
  • GOVERNMENT POLICY ROUNDTABLE: UNDERSTANDING THE NIST RISK MANAGEMENT FRAMEWORK

    Tiffany Jones
    Wed, 11:45 - 12:45
    Palm A
  • 12:20
  • DEFEATING THE TRANSPARENCY FEATURE OF DBI

    Kang Li, Xiaoning Li
    Wed, 12:20 - 12:45
    South Seas CD
  • ANDROID FAKEID VULNERABILITY WALKTHROUGH

    Jeff Forristal
    Wed, 12:20 - 12:45
    Mandalay Bay D
  • 14:15
  • ORACLE DATA REDACTION IS BROKEN

    David Litchfield
    Wed, 14:15 - 15:15
    Lagoon K
  • POINT OF SALE SYSTEM ARCHITECTURE AND SECURITY

    Lucas Zaichkowsky
    Wed, 14:15 - 14:45
    South Seas GH
  • DATA-ONLY PWNING MICROSOFT WINDOWS KERNEL: EXPLOITATION OF KERNEL POOL OVERFLOWS ON MICROSOFT WINDOWS 8.1

    Nikita Tarakanov
    Wed, 14:15 - 15:15
    South Seas CD
  • MOBILE DEVICE MISMANAGEMENT

    Stephen Breen
    Wed, 14:15 - 15:15
    South Seas AB
  • THE BEAST IS IN YOUR MEMORY: RETURN-ORIENTED PROGRAMMING ATTACKS AGAINST MODERN CONTROL-FLOW INTEGRITY PROTECTION TECHNIQUES

    Daniel Lehmann, Ahmad-Reza Sadeghi
    Wed, 14:15 - 15:15
    South Seas E
  • UNVEILING THE OPEN SOURCE VISUALIZATION ENGINE FOR BUSY HACKERS

    Andrew Hay, Thibault Reuille
    Wed, 14:15 - 15:15
    Jasmine Ballroom
  • OPENSTACK CLOUD AT YAHOO SCALE: HOW TO AVOID DISASTER

    Anders Beitnes
    Wed, 14:15 - 14:45
    South Seas IJ
  • GOVERNMENTS AS MALWARE AUTHORS: THE NEXT GENERATION

    Mikko Hypponen
    Wed, 14:15 - 15:15
    Mandalay Bay D
  • VOIP WARS: ATTACK OF THE CISCO PHONES

    Fatih Ozavci
    Wed, 14:15 - 15:15
    South Seas F
  • EMBEDDED DEVICES ROUNDTABLE: EMBEDDING THE MODERN WORLD, WHERE DO WE GO FROM HERE?

    Don A. Bailey, Zach Lanier
    Wed, 14:15 - 15:15
    Palm A
  • 14:50
  • APT ATTRIBUTION AND DNS PROFILING

    Frankie Li
    Wed, 14:50 - 15:50
    South Seas GH
  • PROTECTING DATA IN-USE FROM FIRMWARE AND PHYSICAL ATTACKS

    Steve Weis
    Wed, 14:50 - 15:50
    South Seas IJ
  • 15:30
  • PULLING BACK THE CURTAIN ON AIRPORT SECURITY: CAN A WEAPON GET PAST TSA?

    Billy Rios
    Wed, 15:30 - 16:30
    Lagoon K
  • SECURE BECAUSE MATH: A DEEP-DIVE ON MACHINE LEARNING-BASED MONITORING

    Alex Pinto
    Wed, 15:30 - 16:30
    South Seas GH
  • WHY CONTROL SYSTEM CYBER-SECURITY SUCKS...

    Dr. Stefan Lders
    Wed, 15:30 - 16:30
    South Seas CD
  • MULTIPATH TCP: BREAKING TODAY'S NETWORKS WITH TOMORROW'S PROTOCOLS

    Xinwen Fu, Zhen Ling, Catherine Pearce, Patrick Thomas, Qinggang Yue
    Wed, 15:30 - 16:30
    South Seas AB
  • THE BIG CHILL: LEGAL LANDMINES THAT STIFLE SECURITY RESEARCH AND HOW TO DISARM THEM

    Kevin Bankston, Trey Ford, Marcia Hofmann
    Wed, 15:30 - 16:30
    South Seas E
  • DYNAMIC FLASH INSTRUMENTATION FOR FUN AND PROFITĖ€

    Timo Hirvonen
    Wed, 15:30 - 16:30
    Jasmine Ballroom
  • FINDING AND EXPLOITING ACCESS CONTROL VULNERABILITIES IN GRAPHICAL USER INTERFACES

    Collin Mulliner
    Wed, 15:30 - 16:30
    South Seas IJ
  • REFLECTIONS ON TRUSTING TRUSTZONE

    Dan Rosenberg
    Wed, 15:30 - 16:30
    Mandalay Bay D
  • WHAT GOES AROUND COMES BACK AROUND - EXPLOITING FUNDAMENTAL WEAKNESSES IN BOTNET C&C PANELS!

    Aditya K. Sood
    Wed, 15:30 - 16:00
    South Seas F
  • CERTIFICATIONS ROUNDTABLE: THE QUEST FOR VALUE

    Dave Lewis
    Wed, 15:30 - 16:30
    Palm A
  • 16:05
  • A SCALABLE, ENSEMBLE APPROACH FOR BUILDING AND VISUALIZING DEEP CODE-SHARING NETWORKS OVER MILLIONS OF MALICIOUS BINARIES

    Joshua Saxe
    Wed, 16:05 - 17:05
    South Seas F
  • 17:00
  • BREAKING THE SECURITY OF PHYSICAL DEVICES

    Silvio Cesare
    Wed, 17:00 - 18:00
    Lagoon K
  • CONTEMPORARY AUTOMATIC PROGRAM ANALYSIS

    Julian Cohen
    Wed, 17:00 - 18:00
    South Seas GH
  • RESEARCHING ANDROID DEVICE SECURITY WITH THE HELP OF A DROID ARMY

    Joshua Drake
    Wed, 17:00 - 18:00
    South Seas CD
  • ABUSING PERFORMANCE OPTIMIZATION WEAKNESSES TO BYPASS ASLR

    Yeongjin Jang, Byoungyoung Lee, Tielei Wang
    Wed, 17:00 - 18:00
    South Seas E
  • 802.1X AND BEYOND!

    Brad Antoniewicz
    Wed, 17:00 - 18:00
    Jasmine Ballroom
  • COMPUTRACE BACKDOOR REVISITED

    Sergey Belov, Vitaliy Kamluk, Anibal Sacco
    Wed, 17:00 - 18:00
    South Seas IJ
  • LEARN HOW TO CONTROL EVERY ROOM AT A LUXURY HOTEL REMOTELY: THE DANGERS OF INSECURE HOME AUTOMATION DEPLOYMENT

    Jesus Molina
    Wed, 17:00 - 17:30
    Mandalay Bay D
  • BABAR-IANS AT THE GATE: DATA PROTECTION AT MASSIVE SCALE

    Davi Ottenheimer
    Wed, 17:00 - 18:00
    South Seas F
  • RESPONSIBLE DISCLOSURE ROUNDTABLE: YOU MAD BRO?

    Trey Ford
    Wed, 17:00 - 18:00
    Palm A
  • 17:35
  • HOW TO LEAK A 100-MILLION-NODE SOCIAL GRAPH IN JUST ONE WEEK? - A REFLECTION ON OAUTH AND API DESIGN IN ONLINE SOCIAL NETWORKS

    Pili Hu, Wing Cheong Lau
    Wed, 17:35 - 18:00
    Mandalay Bay D