• Friday, August 7
  • Working together to keep the Internet safe and secure

    Alejandro Mayorkas
    Fri, 10:00 - 10:50
    Track Two
  • Licensed to Pwn: The Weaponization and Regulation of Security Research

    Dave Aitel, Matt Blaze, Nate Cardozo, James Denaro, Mara Tam
    Fri, 11:00 - 12:50
    Track Two
  • Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars

    Samy Kamkar
    Fri, 13:00 - 13:50
    Track Two
  • How to Hack a Tesla Model S

    Kevin Mahaffey, Marc Rogers
    Fri, 14:00 - 14:50
    Track Two
  • Low-cost GPS simulator – GPS spoofing by SDR

    Lin Huang, Qing Yang
    Fri, 15:00 - 15:50
    Track Two
  • Harness: Powershell Weaponization Made Easy (or at least easier)

    Rich Kelley
    Fri, 16:00 - 16:25
    Track Two
  • I Will Kill You

    Chris Rock
    Fri, 16:30 - 16:55
    Track Two
  • Fun with Symboliks

    atlas
    Fri, 17:00 - 17:50
    Track Two
  • Drinking from LETHE: New methods of exploiting and mitigating memory corruption vulnerabilities

    Daniel Selifonov
    Fri, 18:00 - 18:50
    Track Two
  • One Device to Pwn Them All

    Phil Polstra
    Fri, 19:00 - 19:50
    Track Two
  • Saturday, August 8
  • ThunderStrike 2: Sith Strike

    Trammel Hudson, Corey Kallenberg, Xeno Kovah
    Sat, 10:00 - 10:50
    Track Two
  • Machine vs. Machine: Inside DARPA’s Fully Automated CTF

    Mike Walker, Jordan Wiens
    Sat, 11:00 - 11:50
    Track Two
  • F*ck the attribution, show us your .idb!

    Claudio Guarnieri, Morgan Marquis-Boire, Marion Marschalek
    Sat, 12:00 - 12:50
    Track Two
  • Angry Hacking - the next generation of binary analysis

    Yan Shoshitaishvili, Fish Wang
    Sat, 13:00 - 13:50
    Track Two
  • Remote Exploitation of an Unaltered Passenger Vehicle

    Charlie Miller, Christopher Valasek
    Sat, 14:00 - 14:50
    Track Two
  • Hacking Electric Skateboards: Vehicle Research For Mortals

    Richo Healey, Mike Ryan
    Sat, 15:00 - 15:50
    Track Two
  • I want these * bugs off my * Internet

    Dan Kaminsky
    Sat, 16:00 - 16:50
    Track Two
  • Security Necromancy: Further Adventures in Mainframe Hacking

    Chad Rikansrud, Philip Young
    Sat, 17:00 - 17:50
    Track Two
  • Ask the EFF: The Year in Digital Civil Liberties

    Nate Cardozo, Peter Eckersley, Mark Jaycox, Nadia Kayyali, Corynne McSherry, Kurt Opsahl
    Sat, 18:00 - 19:50
    Track Two
  • Sunday, August 9
  • Docker, Docker, Give Me The News, I Got A Bad Case Of Securing You

    David Mortman
    Sun, 10:00 - 10:50
    Track Two
  • Canary: Keeping Your Dick Pics Safe(r)

    Rob Bathurst, Jeff Thomas
    Sun, 11:00 - 11:50
    Track Two
  • Pivoting Without Rights – Introducing Pivoter

    David Kennedy, Geoff Walton
    Sun, 12:00 - 12:50
    Track Two
  • Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts

    Omer Coskun
    Sun, 13:00 - 13:50
    Track Two
  • Let's Talk About SOAP, Baby. Let's Talk About UPNP

    Ricky Lawshae
    Sun, 14:00 - 14:50
    Track Two