• Friday, August 10
  • Securing our Nation's Election Infrastructure

    Jeanette Manfra
    Fri, 10:00 - 10:20
    Track 3
  • Please do not Duplicate: Attacking the Knox Box and Other Keyed Alike Systems

    m010ch_
    Fri, 10:30 - 10:50
    Track 3
  • Lora Smart Water Meter Security Analysis

    Lin Huang, Jun Li, Yingtao Zeng
    Fri, 11:00 - 11:45
    Track 3
  • Who Controls the Controllers—Hacking Crestron IoT Automation Systems

    Ricky Lawshae
    Fri, 12:00 - 12:45
    Track 3
  • One-Click to OWA

    William Martin
    Fri, 13:00 - 13:20
    Track 3
  • Fasten your seatbelts: We are escaping iOS 11 sandbox!

    Xiaolong Bai, Min Zheng
    Fri, 13:30 - 13:50
    Track 3
  • Revolting Radios

    Michael Ossmann, Dominic Spill
    Fri, 14:00 - 14:45
    Track 3
  • Privacy infrastructure, challenges and opportunities

    yawnbox
    Fri, 15:00 - 15:45
    Track 3
  • Your Voice is My Passport

    Azeem Aqil, _delta_zero
    Fri, 16:00 - 16:45
    Track 3
  • Reverse Engineering, hacking documentary series

    Dave Buchwald, Michael Lee Nirenberg
    Fri, 17:00 - 17:45
    Track 3
  • Saturday, August 11
  • You may have paid more than you imagine—Replay Attacks on Ethereum Smart Contracts

    Zhenxuan Bai, Kunzhe Chai, Senhua Wang, Yuwei Zheng
    Sat, 10:00 - 10:45
    Track 3
  • Jailbreaking the 3DS through 7 years of hardening

    smea
    Sat, 11:00 - 11:45
    Track 3
  • Ridealong Adventures—Critical Issues with Police Body Cameras

    Josh Mitchell
    Sat, 12:00 - 12:45
    Track 3
  • Looking for the perfect signature: an automatic YARA rules generation algorithm in the AI-era

    Andrea Marcelli
    Sat, 13:00 - 13:20
    Track 3
  • Infecting The Embedded Supply Chain

    Alex, Zach
    Sat, 13:30 - 14:15
    Track 3
  • Playing Malware Injection with Exploit thoughts

    Sheng-Hao Ma
    Sat, 14:00 - 14:20
    Track 3
  • Fire & Ice: Making and Breaking macOS Firewalls

    Patrick Wardle
    Sat, 14:30 - 14:50
    Track 3
  • Booby Trapping Boxes

    hon1nbo, Ladar Levison
    Sat, 15:00 - 15:45
    Track 3
  • Inside the Fake Science Factory

    Svea Eckert, Till Krause, Chris Sumner
    Sat, 16:00 - 16:45
    Track 3
  • Sunday, August 12
  • For the Love of Money: Finding and exploiting vulnerabilities in mobile point of sales systems

    Leigh Anne Galloway, Timur Yunusov
    Sun, 10:00 - 10:45
    Track 3
  • Demystifying MS17-010: Reverse Engineering the ETERNAL Exploits

    zerosum0x0
    Sun, 11:00 - 11:45
    Track 3
  • Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities

    Matt Knight, Ryan Speers
    Sun, 12:00 - 12:45
    Track 3
  • barcOwned—Popping shells with your cereal box

    magicspacekiwi, Michael West
    Sun, 13:00 - 13:20
    Track 3
  • Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking

    ldionmarcil
    Sun, 13:30 - 13:50
    Track 3
  • One bite and all your dreams will come true: Analyzing and Attacking Apple Kernel Drivers

    Xiaolong Bai, Min Zheng
    Sun, 14:00 - 14:45
    Track 3
  • Fuzzing Malware For Fun & Profit. Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware

    Maksim Shudrak
    Sun, 15:00 - 15:45
    Track 3