• Friday, July 28
  • Secret Tools: Learning about Government Surveillance Software You Can't Ever See

    Peyton Engel
    Fri, 10:00 - 10:20
    Track 4
  • Panel: Meet The Feds

    Leonard Bailey, Andrea Matwyshyn, Terrell McSweeny, Suzanne Schwartz, MD, Lisa Wiswell
    Fri, 10:20 - 11:35
    Track 4
  • Hacking Democracy: A Socratic Dialogue

    Mr. Sean Kanuck
    Fri, 12:00 - 12:45
    Track 4
  • Next-Generation Tor Onion Services

    Roger Dingledine
    Fri, 13:00 - 13:45
    Track 4
  • How we created the first SHA-1 collision and what it means for hash security

    Elie Bursztein
    Fri, 14:00 - 14:45
    Track 4
  • Abusing Certificate Transparency Logs

    Hanno Böck
    Fri, 15:00 - 15:45
    Track 4
  • "Tick, Tick, Tick. Boom! You're Dead." — Tech & the FTC

    Terrell McSweeny, Whitney Merrill
    Fri, 16:00 - 16:45
    Track 4
  • The Internet Already Knows I'm Pregnant

    Kashmir Hill, Cooper Quintin
    Fri, 17:00 - 17:45
    Track 4
  • Saturday, July 29
  • The spear to break the security wall of S7CommPlus

    Cheng Lei, Zhang Yunhai
    Sat, 10:00 - 10:20
    Track 4
  • (Un)Fucking Forensics: Active/Passive (i.e. Offensive/Defensive) memory hacking/debugging.

    K2
    Sat, 10:20 - 10:40
    Track 4
  • Evading next-gen AV using artificial intelligence

    Hyrum Anderson
    Sat, 11:00 - 11:20
    Track 4
  • All Your Things Are Belong To Us

    0x00string, CJ_000, Maximus64, Zenofex
    Sat, 11:20 - 12:35
    Track 4
  • A Picture is Worth a Thousand Words, Literally: Deep Neural Networks for Social Stego

    Michael Raggo, Philip Tully
    Sat, 13:00 - 13:45
    Track 4
  • XenoScan: Scanning Memory Like a Boss

    Nick Cano
    Sat, 14:00 - 14:45
    Track 4
  • Digital Vengeance: Exploiting the Most Notorious C&C Toolkits

    Professor Plum
    Sat, 15:00 - 15:45
    Track 4
  • Game of Drones: Putting the Emerging "Drone Defense" Market to the Test

    Francis Brown, David Latimer
    Sat, 16:00 - 16:45
    Track 4
  • Popping a Smart Gun

    Plore
    Sat, 17:00 - 17:45
    Track 4
  • Sunday, July 30
  • Untrustworthy Hardware and How to Fix It

    0ctane
    Sun, 10:00 - 10:20
    Track 4
  • Ghost in the Droid: Possessing Android Applications with ParaSpectre

    chaosdata
    Sun, 10:20 - 10:40
    Track 4
  • 'Ghost Telephonist' Impersonates You Through LTE CSFB

    Lin Huang, Yuwei Zheng
    Sun, 11:00 - 11:45
    Track 4
  • Genetic Diseases to Guide Digital Hacks of the Human Genome: How the Cancer Moonshot Program will Enable Almost Anyone to Crash the Operating System that Runs You or to End Civilization...

    John Sotos
    Sun, 12:00 - 12:45
    Track 4
  • Revoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using Science

    Daniel Bohannon, Lee Holmes
    Sun, 13:00 - 13:45
    Track 4
  • Friday the 13th: JSON attacks!

    Oleksandr Mirosh, Alvaro Muñoz
    Sun, 14:00 - 14:45
    Track 4