• 09:00
  • Testing Your Organization's Social Media Awareness

    Jacob Wilkin
    Thu, 09:00 - 09:25
    Breakers GHI
  • GDPArrrrr: Using Privacy Laws to Steal Identities

    James Pavur
    Thu, 09:00 - 09:25
    Islander EI
  • Woke Hiring Won't Save Us: An Actionable Approach to Diversity Hiring and Retention

    Rebecca Lynch
    Thu, 09:00 - 09:25
    Islander FG
  • The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring

    Andrea Carcano, Younes Dragoni, Alessandro Di Pinto
    Thu, 09:00 - 09:25
    Jasmine
  • On Trust: Stories from the Front Lines

    Jamil Farshchi
    Thu, 09:00 - 09:25
    Lagoon GHI
  • Mobile Interconnect Threats: How Next-Gen Products May be Already Outdated

    Guillaume Teissier
    Thu, 09:00 - 09:25
    Lagoon JKL
  • Attack Surface as a Service

    Anna Westelius
    Thu, 09:00 - 09:25
    South Pacific
  • Death to the IOC: What's Next in Threat Intelligence

    Bhavna Soman
    Thu, 09:00 - 09:25
    South Seas ABE
  • WebAuthn 101 - Demystifying WebAuthn

    Christiaan Brand
    Thu, 09:00 - 09:25
    South Seas CDF
  • 09:45
  • Rough and Ready: Frameworks to Measure Persistent Engagement and Deterrence

    Jason Healey, Neil Jenkins
    Thu, 09:45 - 10:35
    Breakers GHI
  • The Enemy Within: Modern Supply Chain Attacks

    Eric Doerr
    Thu, 09:45 - 10:35
    Islander EI
  • 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans

    Ang Cui, Richard Housley, Jatin Kataria
    Thu, 09:45 - 10:35
    Islander FG
  • Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities

    Nathan Hauke, David Renardy
    Thu, 09:45 - 10:35
    Jasmine
  • Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller

    Alexandre Gazet, Alexander Matrosov
    Thu, 09:45 - 10:35
    Lagoon GHI
  • Playing Offense and Defense with Deepfakes

    Matt Price, Mike Price
    Thu, 09:45 - 10:35
    Lagoon JKL
  • Planning a Bug Bounty: The Nuts and Bolts from Concept to Launch

    Adam Ruddermann
    Thu, 09:45 - 10:35
    Mandalay Bay CD
  • All Your Apple are Belong to Us: Unique Identification and Cross-Device Tracking of Apple Devices

    Xiaolong Bai, Min Zheng
    Thu, 09:45 - 10:35
    South Pacific
  • Information Security in the Public Interest

    Bruce Schneier
    Thu, 09:45 - 10:35
    South Seas ABE
  • Project Zero: Five Years of "Make 0Day Hard"

    Ben Hawkes
    Thu, 09:45 - 10:35
    South Seas CDF
  • 11:00
  • Rogue7: Rogue Engineering-Station Attacks on S7 Simatic PLCs

    Eli Biham, Sara Bitan, Uriel Malin, Avishai Wool
    Thu, 11:00 - 11:50
    Breakers GHI
  • API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web

    Joshua Maddux
    Thu, 11:00 - 11:50
    Islander FG
  • Operational Templates for State-Level Attack and Collective Defense of Countries

    Greg Conti, Robert Fanelli
    Thu, 11:00 - 11:50
    Jasmine
  • Breaking Encrypted Databases: Generic Attacks on Range Queries

    Marie-Sarah Lacharite
    Thu, 11:00 - 11:50
    Lagoon GHI
  • Women in Security: Building a Female InfoSec Community in Korea, Japan, and Taiwan

    Suhee Kang, Asuka Nakajima, Hazel Yen
    Thu, 11:00 - 11:50
    Lagoon JKL
  • Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months

    Gregory Caswell, Brett Goldstein, Josh Jay, Shannon Sabens, Jarek Stanley
    Thu, 11:00 - 11:50
    Mandalay Bay CD
  • DevSecOps : What, Why and How

    Anant Shrivastava
    Thu, 11:00 - 11:50
    South Pacific
  • Finding Our Path: How We're Trying to Improve Active Directory Security

    Andy Robbins, Will Schroeder, Rohan Vazarkar
    Thu, 11:00 - 11:50
    South Seas ABE
  • Process Injection Techniques - Gotta Catch Them All

    Amit Klein, Itzik Kotler
    Thu, 11:00 - 11:50
    South Seas CDF
  • 12:10
  • Zombie Ant Farming: Practical Tips for Playing Hide and Seek with Linux EDRs

    Dimitry Snezhkov
    Thu, 12:10 - 13:00
    Breakers GHI
  • Ghidra - Journey from Classified NSA Tool to Open Source

    Chris Delikat, Brian Knighton
    Thu, 12:10 - 13:00
    Islander EI
  • Practical Approach to Automate the Discovery and Eradication of Open-Source Software Vulnerabilities at Scale

    Aladdin Almubayed
    Thu, 12:10 - 13:00
    Islander FG
  • Firmware Cartography: Charting the Course for Modern Server Compromise

    Dion Blazakis, Nathan Keltner
    Thu, 12:10 - 13:00
    Jasmine
  • Exploiting Qualcomm WLAN and Modem Over The Air

    Xiling Gong, Peter Pi
    Thu, 12:10 - 13:00
    Lagoon GHI
  • Infighting Among Russian Security Services in the Cyber Sphere

    Kimberly Zenz
    Thu, 12:10 - 13:00
    Lagoon JKL
  • Managing for Success: Maintaining a Healthy Bug Bounty Program Long Term

    Chloe Brown
    Thu, 12:10 - 13:00
    Mandalay Bay CD
  • Behind the scenes of iOS and Mac Security

    Ivan Krstić
    Thu, 12:10 - 13:00
    South Pacific
  • 0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars

    Zhiqiang Cai, Michael Gruffke, Hendrik Schweppe, Aohui Wang, Wenkai Zhang
    Thu, 12:10 - 13:00
    South Seas ABE
  • Predictive Vulnerability Scoring System

    Jay Jacobs, Michael Roytman
    Thu, 12:10 - 13:00
    South Seas CDF
  • 14:30
  • Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime

    Tao Huang, Tielei Wang
    Thu, 14:30 - 15:20
    Breakers GHI
  • Preventing Authentication Bypass: A Tale of Two Researchers

    Ron Chan, Ravi Jaiswal, Terry Zhang
    Thu, 14:30 - 15:20
    Islander EI
  • Making Big Things Better the Dead Cow Way

    Luke Benfey, Joseph Menn, Christien Rioux, Peiter Zatko
    Thu, 14:30 - 15:20
    Islander FG
  • Inside the Apple T2

    Mikhail Davidov, Jeremy Erickson
    Thu, 14:30 - 15:20
    Jasmine
  • Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps

    Maddie Stone
    Thu, 14:30 - 15:20
    Lagoon GHI
  • Automation Techniques in C++ Reverse Engineering

    Rolf Rolles
    Thu, 14:30 - 15:20
    Lagoon JKL
  • Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers

    Sheila A. Berta
    Thu, 14:30 - 15:20
    South Pacific
  • Fantastic Red-Team Attacks and How to Find Them

    Casey Smith, Ross Wolf
    Thu, 14:30 - 15:20
    South Seas ABE
  • Critical Zero Days Remotely Compromise the Most Popular Real-Time OS

    Ben Seri, Dor Zusman
    Thu, 14:30 - 15:20
    South Seas CDF
  • 15:50
  • HostSplit: Exploitable Antipatterns in Unicode Normalization

    Jonathan Birch
    Thu, 15:50 - 16:40
    Breakers GHI
  • Everybody be Cool, This is a Robbery!

    Jean-Baptiste Bédrune, Gabriel Campana
    Thu, 15:50 - 16:40
    Islander EI
  • The Discovery of a Government Malware and an Unexpected Spy Scandal

    Lorenzo Franceschi-Bicchierai
    Thu, 15:50 - 16:40
    Islander FG
  • The Future of ATO

    Philip Martin
    Thu, 15:50 - 16:40
    Jasmine
  • Securing Apps in the Open-By-Default Cloud

    Winston Howes, Michael Wozniak
    Thu, 15:50 - 16:40
    Lagoon GHI
  • Adventures in the Underland: The CQForensic Toolkit as a Unique Weapon Against Hackers

    Paula Januszkiewicz
    Thu, 15:50 - 16:40
    Lagoon JKL
  • Attacking iPhone XS Max

    Tielei Wang, Hao Xu
    Thu, 15:50 - 16:40
    South Pacific
  • A Compendium of Container Escapes

    Brandon Edwards, Nick Freeman
    Thu, 15:50 - 16:40
    South Seas ABE
  • Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project

    Pablo Breuer, David Perlman
    Thu, 15:50 - 16:40
    South Seas CDF
  • 17:00
  • Debug for Bug: Crack and Hack Apple Core by Itself - Fun and Profit to Debug and Fuzz Apple Kernel by lldb Script

    Moony Li, Lilang Wu
    Thu, 17:00 - 18:00
    Breakers GHI
  • Command Injection in F5 iRules

    Christoffer Jerkeby
    Thu, 17:00 - 18:00
    Islander EI
  • Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites

    Ray ., Michael Huebler
    Thu, 17:00 - 18:00
    Islander FG
  • Shifting Knowledge Left: Keeping up with Modern Application Security

    Fletcher Heisler, Mark Stanislav
    Thu, 17:00 - 18:00
    Jasmine
  • Exploring the New World : Remote Exploitation of SQLite and Curl

    YuXiang Li, Wenxiang Qian, HuiYu Wu
    Thu, 17:00 - 18:00
    Lagoon GHI
  • Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory

    Dimiter Andonov, Omar Sardar
    Thu, 17:00 - 18:00
    Lagoon JKL
  • How to Detect that Your Domains are Being Abused for Phishing by Using DNS

    Arnold Hölzel, Karl Lovink
    Thu, 17:00 - 18:00
    South Pacific
  • Lessons and Lulz: The 5th Annual Black Hat USA NOC Report

    Bart Stump, Neil Wyler
    Thu, 17:00 - 18:00
    South Seas ABE
  • Breaking Samsung's ARM TrustZone

    Alexandre Adamski, Joffrey Guilbon, Maxime Peterlin
    Thu, 17:00 - 18:00
    South Seas CDF