• Friday, August 5
  • DARPA Cyber Grand Challenge Award Ceremony

    Dr. Arati Prabhakar, Mike Walker
    Fri, 10:00 - 10:50
    Track Two
  • Project CITL

    Peiter Zatko, Sarah Zatko
    Fri, 11:00 - 11:50
    Track Two
  • Blockfighting with a Hooker -- BlockfFghter2!

    K2
    Fri, 12:00 - 12:50
    Track Two
  • (Ab)using Smart Cities: The Dark Age of Modern Mobility

    Matteo Beccaro, Matteo Collura
    Fri, 13:00 - 13:50
    Track Two
  • A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors

    Francois Charbonneau, Ang Cui, Jatin Kataria
    Fri, 14:00 - 14:50
    Track Two
  • Slouching Towards Utopia: The State of the Internet Dream

    Jennifer Granick
    Fri, 15:00 - 15:50
    Track Two
  • Side-channel Attacks on High-security Electronic Safe Locks

    Plore
    Fri, 16:00 - 16:25
    Track Two
  • Samsung Pay: Tokenized Numbers, Flaws and Issues

    Salvador Mendoza
    Fri, 16:30 - 16:55
    Track Two
  • Sk3wlDbg: Emulating All (well many) of the Things with Ida

    Chris Eagle
    Fri, 17:00 - 17:50
    Track Two
  • Saturday, August 6
  • I Fight For The Users, Episode I - Attacks Against Top Consumer Products

    Zack Fasel, Erin Jacobs
    Sat, 10:00 - 10:50
    Track Two
  • Light-Weight Protocol! Serious Equipment! Critical Implications!

    Neal Hindocha, Lucas Lundgren
    Sat, 11:00 - 11:50
    Track Two
  • Stargate: Pivoting Through VNC to Own Internal Networks

    Yonathan Klijnsma, Dan Tentler
    Sat, 12:00 - 12:25
    Track Two
  • pin2pwn: How to Root an Embedded Linux Box with a Sewing Needle

    Brad Dixon
    Sat, 12:30 - 12:55
    Track Two
  • MouseJack: Injecting Keystrokes into Wireless Mice

    Marc Newlin
    Sat, 13:00 - 13:50
    Track Two
  • Universal Serial aBUSe: Remote Physical Access Attacks

    Rogan Dawes, Dominic White
    Sat, 14:00 - 14:50
    Track Two
  • Playing Through the Pain? - The Impact of Secrets and Dark Knowledge on Security and Intelligence Professionals

    Richard Thieme
    Sat, 15:00 - 15:50
    Track Two
  • DIY Nukeproofing: A New Dig at 'Datamining'

    3AlarmLampScooter
    Sat, 16:00 - 16:25
    Track Two
  • All Your Solar Panels are Belong to Me

    Fred Bret-Mounet
    Sat, 16:30 - 16:55
    Track Two
  • Abusing Bleeding Edge Web Standards for AppSec Glory

    Ryan Lester, Bryant Zadegan
    Sat, 17:00 - 17:50
    Track Two
  • Sunday, August 7
  • Hacking Hotel Keys and Point of Sale Systems: Attacking Systems Using Magnetic Secure Transmission

    Weston Hecker
    Sun, 10:00 - 10:50
    Track Two
  • Discovering and Triangulating Rogue Cell Towers

    Eric Escobar
    Sun, 11:00 - 11:50
    Track Two
  • Let’s Get Physical: Network Attacks Against Physical Security Systems

    Ricky Lawshae
    Sun, 12:00 - 12:50
    Track Two
  • Drones Hijacking - multi-dimensional attack vectors and countermeasures

    Aaron Luo
    Sun, 13:00 - 13:50
    Track Two
  • An Introduction to Pinworm: Man in the Middle for your Metadata

    bigezy, saci
    Sun, 14:00 - 14:50
    Track Two
  • Cyber Grand Shellphish

    Antonio Bianchi, Kevin Borgolte, Jacopo Corbetta, Francesco Disperati, Andrew Dutcher, Aravind Machiry, Chris Salls, Yan Shoshitaishvili, Nick Stephens, Giovanni Vigna, Fish Wang
    Sun, 15:00 - 15:50
    Track Two