• Friday, August 7
  • Shall We Play a Game?

    Tamas Szakaly
    Fri, 10:00 - 10:50
    Track One
  • Stagefright: Scary Code in the Heart of Android

    Joshua Drake
    Fri, 11:00 - 11:50
    Track One
  • Malware in the Gaming Micro-economy

    Zack Allen, Rusty Bower
    Fri, 12:00 - 12:50
    Track One
  • Insteon' False Security And Deceptive Documentation

    Ryan Gooler, Peter Shipley
    Fri, 13:00 - 13:50
    Track One
  • Build a free cellular traffic capture tool with a vxworks based femoto

    Haoqi Shan, Yuwei Zheng
    Fri, 14:00 - 14:50
    Track One
  • How to hack your way out of home detention

    AmmonRa
    Fri, 15:00 - 15:50
    Track One
  • HamSammich – long distance proxying over radio

    Rob Graham, David Maynor
    Fri, 16:00 - 16:25
    Track One
  • How to secure the keyboard chain

    Paul Amicelli, Baptiste David
    Fri, 16:30 - 16:55
    Track One
  • When IoT attacks: hacking a Linux-powered rifle

    Michael Auger, Runa A. Sandvik
    Fri, 17:00 - 17:50
    Track One
  • How to Train Your RFID Hacking Tools

    Craig Young
    Fri, 18:00 - 18:50
    Track One
  • Saturday, August 8
  • Scared Poopless – LTE and *your* laptop

    Jesse Michael, Mickey Shkatov
    Sat, 10:00 - 10:50
    Track One
  • Key-Logger, Video, Mouse — How To Turn Your KVM Into a Raging Key-logging Monster

    Yaniv Balmas, Lior Oppenheim
    Sat, 11:00 - 11:50
    Track One
  • Hacking Smart Safes: On the "Brink" of a Robbery

    Dan Petro, Oscar Salazar
    Sat, 12:00 - 12:50
    Track One
  • Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex Data Service

    Colby Moore
    Sat, 13:00 - 13:50
    Track One
  • Extracting the Painful (blue)tooth

    Matteo Beccaro, Matteo Collura
    Sat, 14:00 - 14:50
    Track One
  • Looping Surveillance Cameras through Live Editing of Network Streams

    Eric Van Albert, Zach Banks
    Sat, 15:00 - 15:50
    Track One
  • Switches Get Stitches

    Colin Cassidy, Robert M. Lee, Éireann Leverett
    Sat, 16:00 - 16:50
    Track One
  • Exploring Layer 2 Network Security in Virtualized Environments

    Ronny L. Bull, Dr. Jeanna N. Matthews
    Sat, 17:00 - 17:50
    Track One
  • Staying Persistent in Software Defined Networks

    Gregory Pickett
    Sat, 18:00 - 18:50
    Track One
  • Sunday, August 9
  • Abusing Adobe Reader’s JavaScript APIs

    Brian Gorenc, Abdul-Aziz Hariri, Jasiel Spelman
    Sun, 10:00 - 10:50
    Track One
  • Who Will Rule the Sky? The Coming Drone Policy Wars

    Matt Cagle, Eric Cheng
    Sun, 11:00 - 11:50
    Track One
  • Knocking my neighbor’s kid’s cruddy drone offline

    Michael Robinson
    Sun, 12:00 - 12:50
    Track One
  • Attacking Hypervisors Using Firmware and Hardware

    Oleksandr Bazhaniuk, Yuriy Bulygin, Andrew Furtak, Mikhail Gorobets, Alexander Matrosov
    Sun, 13:00 - 13:50
    Track One
  • Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core

    Etienne Martineau
    Sun, 14:00 - 14:50
    Track One
  • Closing Ceremonies

     
    Sun, 16:30 - 18:00
    Track One