• Wednesday, August 8
  • Detecting Credential Compromise in AWS

    William Bengtson
    Wed, 10:30 - 10:55
    South Pacific F
  • A Dive in to Hyper-V Architecture & Vulnerabilities

    Joe Bialek, Nicolas Joly
    Wed, 11:15 - 12:05
    South Pacific F
  • Remotely Attacking System Firmware

    Oleksandr Bazhaniuk, Jesse Michael, Mickey Shkatov
    Wed, 13:30 - 14:20
    South Pacific F
  • Meltdown: Basics Details Consequences

    Daniel Gruss, Moritz Lipp, Michael Schwarz
    Wed, 14:40 - 15:30
    South Pacific F
  • Behind the Speculative Curtain: The True Story of Fighting Meltdown and Spectre

    Eric Doerr, Matt Linton, Art Manion, Chris Robinson
    Wed, 16:00 - 16:50
    South Pacific F
  • The Air-Gap Jumpers

    Mordechai Guri
    Wed, 17:05 - 17:30
    South Pacific F
  • Thursday, August 9
  • Two-Factor Authentication Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key

    L Jean Camp, Sanchari Das, Gianpaolo Russo
    Thu, 09:00 - 09:25
    South Pacific F
  • Identity Theft: Attacks on SSO Systems

    Kelby Ludwig
    Thu, 09:45 - 10:35
    South Pacific F
  • GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs

    Christopher Domas
    Thu, 11:00 - 11:50
    South Pacific F
  • So I became a Domain Controller

    Benjamin Delpy, Vincent Le Toux
    Thu, 12:10 - 13:00
    South Pacific F
  • Catch me Yes we can! – Pwning Social Engineers using Natural Language Processing Techniques in Real-Time

    Marcel Carlsson, Ian Harris
    Thu, 14:30 - 15:20
    South Pacific F
  • IoT Malware: Comprehensive Survey Analysis Framework and Case Studies

    Andrei Costin, Jonas Zaddach
    Thu, 15:50 - 16:40
    South Pacific F
  • An Attacker Looks at Docker: Approaching Multi-Container Applications

    Wesley Mcgrew
    Thu, 17:00 - 17:50
    South Pacific F