• 09:00
  • BADUSB - ON ACCESSORIES THAT TURN EVIL

    Jakob Lell, Karsten Nohl
    Thu, 09:00 - 10:00
    Lagoon K
  • EPIDEMIOLOGY OF SOFTWARE VULNERABILITIES: A STUDY OF ATTACK SURFACE SPREAD

    Jake Kouns, Kymberlee Price
    Thu, 09:00 - 09:30
    South Seas GH
  • IT JUST (NET)WORKS: THE TRUTH ABOUT IOS 7'S MULTIPEER CONNECTIVITY FRAMEWORK

    Alban Diquet
    Thu, 09:00 - 09:30
    South Seas CD
  • REVERSE-ENGINEERING THE SUPRA IBOX: EXPLOITATION OF A HARDENED MSP430-BASED DEVICE

    Braden Thomas
    Thu, 09:00 - 10:00
    South Seas AB
  • WRITE ONCE, PWN ANYWHERE

    Yang Yu
    Thu, 09:00 - 10:00
    South Seas E
  • STAY OUT OF THE KITCHEN: A DLP SECURITY BAKE-OFF

    Zach Lanier, Kelly Lum
    Thu, 09:00 - 10:00
    Jasmine Ballroom
  • I KNOW YOUR FILTERING POLICY BETTER THAN YOU DO: EXTERNAL ENUMERATION AND EXPLOITATION OF EMAIL AND WEB SECURITY SOLUTIONS

    Ben Williams
    Thu, 09:00 - 10:00
    South Seas IJ
  • THE NEW SCOURGE OF RANSOMWARE: A STUDY OF CRYPTOLOCKER AND ITS FRIENDS

    John Bambenek, Lance James
    Thu, 09:00 - 10:00
    Mandalay Bay D
  • HOW SMARTCARD PAYMENT SYSTEMS FAIL

    Ross Anderson
    Thu, 09:00 - 10:00
    South Seas F
  • MOBILE SECURITY ROUNDTABLE: WHAT DOES MOBILE SECURITY LOOK LIKE TODAY? WHAT WILL IT LOOK LIKE TOMORROW?

    Vincenzo Iozzo, Peiter Zatko
    Thu, 09:00 - 10:00
    Palm A
  • 09:35
  • ONE PACKER TO RULE THEM ALL: EMPIRICAL IDENTIFICATION, COMPARISON, AND CIRCUMVENTION OF CURRENT ANTIVIRUS DETECTION TECHNIQUES

    Alaeddine Mesbahi, Arne Swinnen
    Thu, 09:35 - 10:00
    South Seas GH
  • ABUSE OF CPE DEVICES AND RECOMMENDED FIXES

    Jonathan Spring, Paul Vixie
    Thu, 09:35 - 10:00
    South Seas CD
  • 10:15
  • BUILDING SAFE SYSTEMS AT SCALE - LESSONS FROM SIX MONTHS AT YAHOO

    Alex Stamos
    Thu, 10:15 - 11:15
    Lagoon K
  • SIDEWINDER TARGETED ATTACK AGAINST ANDROID IN THE GOLDEN AGE OF AD LIBS

    Tao Wei, Yulong Zhang
    Thu, 10:15 - 10:45
    South Seas GH
  • BITCOIN TRANSACTION MALLEABILITY THEORY IN PRACTICE

    Daniel Chechik, Ben Hayak
    Thu, 10:15 - 11:15
    South Seas CD
  • ICSCORSAIR: HOW I WILL PWN YOUR ERP THROUGH 4-20 MA CURRENT LOOP

    Alexander Bolshev, Gleb Cherbov
    Thu, 10:15 - 11:15
    South Seas AB
  • SAVING CYBERSPACE

    Jason Healey
    Thu, 10:15 - 11:15
    South Seas E
  • A PRACTICAL ATTACK AGAINST VDI SOLUTIONS

    Daniel Brodie, Michael Shaulov
    Thu, 10:15 - 11:15
    Jasmine Ballroom
  • WHEN THE LIGHTS GO OUT: HACKING CISCO ENERGYWISE

    Ayhan Soner Koca, Matthias Luft
    Thu, 10:15 - 11:15
    South Seas IJ
  • EXTREME PRIVILEGE ESCALATION ON WINDOWS 8/UEFI SYSTEMS

    Sam Cornwell, Corey Kallenberg, Xeno Kovah
    Thu, 10:15 - 11:15
    Mandalay Bay D
  • LEVIATHAN: COMMAND AND CONTROL COMMUNICATIONS ON PLANET EARTH

    Kenneth Geers, Kevin Thompson
    Thu, 10:15 - 11:15
    South Seas F
  • MEDICAL DEVICES ROUNDTABLE: IS THERE A DOCTOR IN THE HOUSE? SECURITY AND PRIVACY IN THE MEDICAL WORLD

    Jerome Radcliffe
    Thu, 10:15 - 11:15
    Palm A
  • 10:50
  • THREAT INTELLIGENCE LIBRARY - A NEW REVOLUTIONARY TECHNOLOGY TO ENHANCE THE SOC BATTLE RHYTHM!

    Ryan Trost
    Thu, 10:50 - 11:15
    South Seas GH
  • 11:45
  • MISSION MPOSSIBLE

    Jon Butler, Nils
    Thu, 11:45 - 12:45
    Lagoon K
  • GRR: FIND ALL THE BADNESS, COLLECT ALL THE THINGS

    Greg Castle
    Thu, 11:45 - 12:45
    South Seas GH
  • ABUSING MICROSOFT KERBEROS: SORRY YOU GUYS DON'T GET IT

    Benjamin Delpy, Alva Duckwall
    Thu, 11:45 - 12:45
    South Seas CD
  • MORE SHADOW WALKER: THE PROGRESSION OF TLB-SPLITTING ON X86

    Jacob Torrey
    Thu, 11:45 - 12:45
    South Seas AB
  • EXPLOITING UNPATCHED IOS VULNERABILITIES FOR FUN AND PROFIT

    Yeongjin Jang, Billy Lau, Byoungyoung Lee, Tielei Wang
    Thu, 11:45 - 12:45
    South Seas E
  • RAVAGE - RUNTIME ANALYSIS OF VULNERABILITIES AND GENERATION OF EXPLOITS

    Yoel Gluck, Xiaoran Wang
    Thu, 11:45 - 12:45
    Jasmine Ballroom
  • INTERNET SCANNING - CURRENT STATE AND LESSONS LEARNED

    Mark Schloesser
    Thu, 11:45 - 12:15
    South Seas IJ
  • SMART NEST THERMOSTAT: A SMART SPY IN YOUR HOME

    Daniel Buentello, Grant Hernandez, Yier Jin
    Thu, 11:45 - 12:45
    Mandalay Bay D
  • THINKING OUTSIDE THE SANDBOX - VIOLATING TRUST BOUNDARIES IN UNCOMMON WAYS

    Brian Gorenc, Jasiel Spelman
    Thu, 11:45 - 12:45
    South Seas F
  • PRAGMATIC SECURITY AUTOMATION ROUNDTABLE

    Rich Mogull
    Thu, 11:45 - 12:45
    Palm A
  • 12:20
  • FROM ATTACKS TO ACTION - BUILDING A USABLE THREAT MODEL TO DRIVE DEFENSIVE CHOICES

    Tony Sager
    Thu, 12:20 - 12:45
    South Seas IJ
  • 14:15
  • 48 DIRTY LITTLE SECRETS CRYPTOGRAPHERS DON'T WANT YOU TO KNOW

    Thomas Ptacek
    Thu, 14:15 - 15:15
    Lagoon K
  • SVG: EXPLOITING BROWSERS WITHOUT IMAGE PARSING BUGS

    Rennie deGraaf
    Thu, 14:15 - 14:45
    South Seas CD
  • MINIATURIZATION

    Jason Larsen
    Thu, 14:15 - 15:15
    South Seas AB
  • THE DEVIL DOES NOT EXIST - THE ROLE OF DECEPTION IN CYBER

    Matt Devost, Mark Mateski
    Thu, 14:15 - 15:15
    South Seas E
  • TIME TRIAL: RACING TOWARDS PRACTICAL TIMING ATTACKS

    Daniel A. Mayer, Joel Sandin
    Thu, 14:15 - 15:15
    Jasmine Ballroom
  • THE STATE OF INCIDENT RESPONSE

    Bruce Schneier
    Thu, 14:15 - 15:15
    Mandalay Bay D
  • "NOBODY IS LISTENING TO YOUR PHONE CALLS." REALLY? A DEBATE AND DISCUSSION ON THE NSA'S ACTIVITIES

    J. Michael Allen, Mark Jaycox
    Thu, 14:15 - 15:15
    South Seas F
  • BE MEAN TO YOUR CODE ROUNDTABLE: SECURITY IN THE AGE OF CONTINUOUS INTEGRATION & DEPLOYMENT

    Matt Johansen
    Thu, 14:15 - 15:15
    Palm A
  • 14:50
  • STATIC DETECTION AND AUTOMATIC EXPLOITATION OF INTENT MESSAGE VULNERABILITIES IN ANDROID APPLICATIONS

    Daniele Gallingani
    Thu, 14:50 - 15:15
    South Seas CD
  • 15:30
  • SATCOM TERMINALS: HACKING BY AIR, SEA, AND LAND

    Ruben Santamarta
    Thu, 15:30 - 16:30
    Lagoon K
  • FINGERPRINTING WEB APPLICATION PLATFORMS BY VARIATIONS IN PNG IMPLEMENTATIONS

    Dominique Bongard
    Thu, 15:30 - 16:00
    South Seas GH
  • WHY YOU NEED TO DETECT MORE THAN PTH

    Matthew Hathaway, Jeff Myers
    Thu, 15:30 - 16:30
    South Seas CD
  • CATCHING MALWARE EN MASSE: DNS AND IP STYLE

    Dhia Mahjoub, Thibault Reuille, Andree Toonk
    Thu, 15:30 - 16:30
    South Seas AB
  • LIFECYCLE OF A PHONE FRAUDSTER: EXPOSING FRAUD ACTIVITY FROM RECONNAISSANCE TO TAKEOVER USING GRAPH ANALYSIS AND ACOUSTICAL ANOMALIES

    Vijay Balasubramaniyan, Raj Bandyopadhyay, Telvis Calhoun
    Thu, 15:30 - 16:30
    South Seas E
  • UNDERSTANDING IMSI PRIVACY

    Ravishankar Borgaonkar, Swapnil Udar
    Thu, 15:30 - 16:30
    Jasmine Ballroom
  • A JOURNEY TO PROTECT POINTS-OF-SALE

    Nir Valtman
    Thu, 15:30 - 16:30
    South Seas IJ
  • CALL TO ARMS: A TALE OF THE WEAKNESSES OF CURRENT CLIENT-SIDE XSS FILTERING

    Martin Johns, Sebastian Lekies, Ben Stock
    Thu, 15:30 - 16:30
    Mandalay Bay D
  • SAP, CREDIT CARDS, AND THE BIRD THAT TALKS TOO MUCH

    Ertunga Arsal
    Thu, 15:30 - 16:30
    South Seas F
  • SECURITY AND SOFTWARE DEFINED NETWORKING ROUNDTABLE: NEW EXPOSURES OR NEW OPPORTUNITIES?

    Bob Stratton
    Thu, 15:30 - 16:30
    Palm A
  • 16:05
  • INVESTIGATING POWERSHELL ATTACKS

    Matt Hastings, Ryan Kazanciyan
    Thu, 16:05 - 16:30
    South Seas GH
  • 17:00
  • HACKING THE WIRELESS WORLD WITH SOFTWARE DEFINED RADIO - 2.0

    Balint Seeber
    Thu, 17:00 - 18:00
    Lagoon K
  • UNWRAPPING THE TRUTH: ANALYSIS OF MOBILE APPLICATION WRAPPING SOLUTIONS

    Ron Gutierrez, Stephen Komal
    Thu, 17:00 - 18:00
    South Seas GH
  • CAPSTONE: NEXT GENERATION DISASSEMBLY FRAMEWORK

    Quynh Nguyen Anh
    Thu, 17:00 - 18:00
    South Seas CD
  • EXPOSING BOOTKITS WITH BIOS EMULATION

    Lars Haukli
    Thu, 17:00 - 18:00
    South Seas AB
  • CREATING A SPIDER GOAT: USING TRANSACTIONAL MEMORY SUPPORT FOR SECURITY

    Igor Muttik, Alex Nayshtut
    Thu, 17:00 - 18:00
    South Seas E
  • UNDERSTANDING TOCTTOU IN THE WINDOWS KERNEL FONT SCALER ENGINE

    Yu Wang
    Thu, 17:00 - 18:00
    Jasmine Ballroom
  • PROBABILISTIC SPYING ON ENCRYPTED TUNNELS

    Brandon Niemczyk, Prasad Rao
    Thu, 17:00 - 17:30
    South Seas IJ
  • POACHER TURNED GAMEKEEPER: LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS

    Rafal Wojtczuk
    Thu, 17:00 - 18:00
    Mandalay Bay D
  • THE NEW PAGE OF INJECTIONS BOOK: MEMCACHED INJECTIONS

    Ivan Novikov
    Thu, 17:00 - 18:00
    South Seas F
  • 17:35
  • BADGER - THE NETWORKED SECURITY STATE ESTIMATION TOOLKIT

    Edmond Rogers, William Rogers, Gabe Weaver
    Thu, 17:35 - 18:00
    South Seas IJ