• Thursday, August 6
  • Hardware and Trust Security: Explain it like I’m 5

    Nick Anderson, Ted Reed
    Thu, 10:00 - 10:50
    Track Four
  • Hacking Web Apps

    Brent White
    Thu, 11:00 - 11:50
    Track Four
  • Seeing through the Fog

    Zack Fasel
    Thu, 12:00 - 12:50
    Track Four
  • Alice and Bob are Really Confused

    David Huerta
    Thu, 13:00 - 13:50
    Track Four
  • Hacker in the Wires

    Phil Polstra
    Thu, 14:00 - 14:50
    Track Four
  • Forensic Artifacts From a Pass the Hash Attack

    Gerard Laygui
    Thu, 15:00 - 15:50
    Track Four
  • Sorry, Wrong Number: Mysteries Of The Phone System - Past and Present

    Patrick McNeil, Owen
    Thu, 16:00 - 16:50
    Track Four
  • Backdooring Git

    John Menerick
    Thu, 17:00 - 17:50
    Track Four
  • Secure Messaging for Normal People

    Justin Engler
    Thu, 18:00 - 18:50
    Track Four
  • Friday, August 7
  • Bugged Files: Is Your Document Telling on You?

    Dan Crowley, Damon Smith
    Fri, 10:00 - 10:50
    Track Four
  • Goodbye Memory Scraping Malware: Hold Out Till "Chip And Pin”

    Weston Hecker
    Fri, 11:00 - 11:50
    Track Four
  • Confessions of a Professional Cyber Stalker

    Ken Westin
    Fri, 12:00 - 12:50
    Track Four
  • Don't Whisper my Chips: Sidechannel and Glitching for Fun and Profit

    Colin O'Flynn
    Fri, 13:00 - 13:50
    Track Four
  • Cracking Cryptocurrency Brainwallets

    Ryan Castellucci
    Fri, 14:00 - 14:50
    Track Four
  • Quantum Computers vs. Computers Security

    Jean-Philippe Aumasson
    Fri, 15:00 - 15:50
    Track Four
  • Tell me who you are and I will tell you your lock pattern

    Marte Løge
    Fri, 16:00 - 16:25
    Track Four
  • Separating Bots from the Humans

    Ryan Mitchell
    Fri, 16:30 - 16:55
    Track Four
  • Hack the Legacy! IBM i (aka AS/400) Revealed.

    Bart Kulach
    Fri, 17:00 - 17:50
    Track Four
  • Breaking SSL Using Time Synchronisation Attacks

    Jose Selvi
    Fri, 18:00 - 18:50
    Track Four
  • Saturday, August 8
  • Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities

    Aditya K. Sood
    Sat, 10:00 - 10:50
    Track Four
  • QARK: Android App Exploit and SCA Tool

    Tushar Dalvi, Tony Trummer
    Sat, 11:00 - 11:50
    Track Four
  • Chigula — a framework for Wi-Fi Intrusion Detection and Forensics

    Vivek Ramachandran
    Sat, 12:00 - 12:50
    Track Four
  • From 0 To Secure In 1 Minute — Securing IAAS

    Moshe Ferber, Nir Valtman
    Sat, 13:00 - 13:50
    Track Four
  • BurpKit - Using WebKit to Own the Web

    Nadeem Douba
    Sat, 14:00 - 14:50
    Track Four
  • Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web

    Peter Eckersley, James Kasten, Yan Zhu
    Sat, 15:00 - 15:50
    Track Four
  • NSA Playset: JTAG Implants

    Joe FitzPatrick, Matt King
    Sat, 16:00 - 16:50
    Track Four
  • Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0

    Richard Thieme
    Sat, 17:00 - 17:50
    Track Four
  • DIY Nukeproofing: a new dig at "data-mining"

    3AlarmLampscooter
    Sat, 18:00 - 18:50
    Track Four
  • I’m A Newbie Yet I Can Hack ZigBee – Take Unauthorized Control Over ZigBee Devices

    LI Jun, YANG Qing
    Sat, 19:00 - 19:50
    Track Four