• 09:00
  • AN INTERVIEW WITH NEAL STEPHENSON

    Neal Stephenson
    Thu, 09:00 - 10:00
    Augustus I+II
  • 10:15
  • TRUST, SECURITY, AND SOCIETY

    Bruce Schneier
    Thu, 10:15 - 11:15
    Augustus III+IV - Defining the Scope
  • HTML5 TOP 10 THREATS – STEALTH ATTACKS AND SILENT EXPLOITS

    Shreeraj Shah
    Thu, 10:15 - 11:15
    Augustus I+II - Web Apps
  • A SCIENTIFIC (BUT NON ACADEMIC) STUDY OF HOW MALWARE EMPLOYS ANTI-DEBUGGING, ANTI-DISASSEMBLY AND ANTI-VIRTUALIZATION TECHNOLOGIES

    Rodrigo Rubira Branco
    Thu, 10:15 - 11:15
    Augustus V+VI - Mobile
  • CATCHING INSIDER DATA THEFT WITH STOCHASTIC FORENSICS

    Jonathan Grier
    Thu, 10:15 - 11:15
    Palace I - Enterprise Intrigue
  • THE SUBWAY LINE 8 - EXPLOITATION OF WINDOWS 8 METRO STYLE APPS

    Ming-chieh Pan, Sung-Ting Tsai
    Thu, 10:15 - 11:15
    Palace II - 92.2% Market Share
  • IOS SECURITY

    Dallas De Atley
    Thu, 10:15 - 11:15
    Palace III - Over the Air and In The Device
  • STILL PASSING THE HASH 15 YEARS LATER? USING THE KEYS TO THE KINGDOM TO ACCESS ALL YOUR DATA

    Christopher Campbell, Alva Duckwall
    Thu, 10:15 - 11:15
    Romans I-IV - Mass Effect
  • LESSONS OF BINARY ANALYSIS

    Christien Rioux
    Thu, 10:15 - 12:45
    Florentine - Applied Workshop I
  • THE DARK ART OF IOS APPLICATION HACKING

    Jonathan Zdziarski
    Thu, 10:15 - 12:45
    Pompeian - Applied Workshop II
  • 11:45
  • THE CHRISTOPHER COLUMBUS RULE AND DHS

    Mark Weatherford
    Thu, 11:45 - 12:45
    Augustus III+IV - Defining the Scope
  • AMF TESTING MADE EASY!

    Luca Carettoni
    Thu, 11:45 - 12:45
    Augustus I+II - Web Apps
  • DE MYSTERIIS DOM JOBSIVS: MAC EFI ROOTKITS

    Loukas K
    Thu, 11:45 - 12:45
    Augustus V+VI - Mobile
  • FIND ME IN YOUR DATABASE: AN EXAMINATION OF INDEX SECURITY

    David Litchfield
    Thu, 11:45 - 12:45
    Palace I - Enterprise Intrigue
  • WE HAVE YOU BY THE GADGETS

    Toby Kohlenberg, Mickey Shkatov
    Thu, 11:45 - 12:45
    Palace II - 92.2% Market Share
  • IOS KERNEL HEAP ARMAGEDDON REVISITED

    Stefan Esser
    Thu, 11:45 - 12:45
    Palace III - Over the Air and In The Device
  • RECENT JAVA EXPLOITATION TRENDS AND MALWARE

    Jeongwook Oh
    Thu, 11:45 - 12:45
    Romans I-IV - Mass Effect
  • 14:15
  • LEGAL ASPECTS OF CYBERSPACE OPERATIONS

    Robert Clark
    Thu, 14:15 - 15:15
    Augustus III+IV - Defining the Scope
  • HACKING WITH WEBSOCKETS

    Sergey Shekyan, Vaagn Toukharian
    Thu, 14:15 - 15:15
    Augustus I+II - Web Apps
  • DEX EDUCATION: PRACTICING SAFE DEX

    Tim Strazzere
    Thu, 14:15 - 15:15
    Augustus V+VI - Malware
  • PASSIVE BLUETOOTH MONITORING IN SCAPY

    Ryan Holeman
    Thu, 14:15 - 14:35
    Palace I - Enterprise Intrigue
  • EXCHANGING DEMANDS

    Peter Hannay
    Thu, 14:15 - 15:15
    Palace II - 92.2% Market Share
  • WHEN SECURITY GETS IN THE WAY: PENTESTING MOBILE APPS THAT USE CERTIFICATE PINNING

    Alban Diquet, Justine Osborne
    Thu, 14:15 - 14:35
    Palace III - Over the Air and In The Device
  • DIGGING DEEP INTO THE FLASH SANDBOXES

    Paul Sabanal, Mark Yason
    Thu, 14:15 - 15:15
    Romans I-IV - Mass Effect
  • SNSCAT: WHAT YOU DON'T KNOW ABOUT SOMETIMES HURTS THE MOST

    Dan Gunter, Soloman S
    Thu, 14:15 - 15:15
    Florentine - Applied Workshop I
  • RUBY FOR PENTESTERS: THE WORKSHOP

    Timur Duehr, Cory Scott, Michael Tracy
    Thu, 14:15 - 18:00
    Pompeian - Applied Workshop II
  • 14:35
  • SYNFUL DECEIT, STATEFUL SUBTERFUGE

    Chris Patten, Tom Steele
    Thu, 14:35 - 14:55
    Palace I - Enterprise Intrigue
  • EMBEDDED DEVICE FIRMWARE VULNERABILITY HUNTING USING FRAK

    Ang Cui
    Thu, 14:35 - 14:55
    Palace III - Over the Air and In The Device
  • 14:55
  • STAMP OUT HASH CORRUPTION, CRACK ALL THE THINGS

    Jonathan Claudius, Ryan Reynolds
    Thu, 14:55 - 15:15
    Palace I - Enterprise Intrigue
  • MAPPING AND EVOLUTION OF ANDROID PERMISSIONS

    Zach Lanier, Andrew Reiter
    Thu, 14:55 - 15:15
    Palace III - Over the Air and In The Device
  • 15:30
  • TARGETED INTRUSION REMEDIATION: LESSONS FROM THE FRONT LINES

    Jim Aldridge
    Thu, 15:30 - 16:30
    Augustus III+IV - Defining the Scope
  • BLENDED THREATS AND JAVASCRIPT: A PLAN FOR PERMANENT NETWORK COMPROMISE

    Josh Brashars, Phil Purviance
    Thu, 15:30 - 16:30
    Augustus I+II - Web Apps
  • HARDWARE BACKDOORING IS PRACTICAL

    Jonathan Brossard
    Thu, 15:30 - 16:30
    Augustus V+VI - Malware
  • CLONEWISE - AUTOMATED PACKAGE CLONE DETECTION

    Silvio Cesare
    Thu, 15:30 - 16:30
    Palace I - Enterprise Intrigue
  • WINDOWS PHONE 7 INTERNALS AND EXPLOITABILITY

    Tsukasa Oi
    Thu, 15:30 - 16:30
    Palace II - 92.2% Market Share
  • IOS APPLICATION SECURITY ASSESSMENT AND AUTOMATION: INTRODUCING SIRA

    Joshua Dubik, Justin Engler, Seth Law, David Vo
    Thu, 15:30 - 16:30
    Palace III - Over the Air and In The Device
  • SQL INJECTION TO MIPS OVERFLOWS: ROOTING SOHO ROUTERS

    Zachary Cutlip
    Thu, 15:30 - 16:30
    Romans I-IV - Mass Effect
  • MOBILE NETWORK FORENSICS WORKSHOP

    Eric Fulton
    Thu, 15:30 - 18:00
    Florentine - Applied Workshop I
  • 17:00
  • HACKING THE CORPORATE MIND: USING SOCIAL ENGINEERING TACTICS TO IMPROVE ORGANIZATIONAL SECURITY ACCEPTANCE

    James Philput
    Thu, 17:00 - 18:00
    Augustus III+IV - Defining the Scope
  • STATE OF WEB EXPLOIT TOOLKITS

    Jason Jones
    Thu, 17:00 - 18:00
    Augustus I+II - Web Apps
  • FLOWERS FOR AUTOMATED MALWARE ANALYSIS

    Paul Royal, Chengyu Song
    Thu, 17:00 - 18:00
    Augustus V+VI - Malware
  • SSRF VS. BUSINESS CRITICAL APPLICATIONS

    Dmitry Chastuhin, Alexander Polyakov
    Thu, 17:00 - 18:00
    Palace I - Enterprise Intrigue
  • EASY LOCAL WINDOWS KERNEL EXPLOITATION

    Cesar Cerrudo
    Thu, 17:00 - 18:00
    Palace II - 92.2% Market Share
  • HOW MANY BRICKS DOES IT TAKE TO CRACK A MICROCELL?

    Mathew Rowley
    Thu, 17:00 - 18:00
    Palace III - Over the Air and In The Device
  • HOOKIN' AIN'T EASY: BEEF INJECTION WITH MITM

    Ryan Linn, Steve Ocepek
    Thu, 17:00 - 18:00
    Romans I-IV - Mass Effect