• 10:00
  • Genuinely "Trusted Computing:" Free and Open Hardware Security Modules

    Ryan Lackey
    Sat, 10:00 - 10:50
    Build It Room - Build It
  • Introducing DARPA's Cyber Grand Challenge

    Mike Walker
    Sat, 10:00 - 10:50
    Belay It room - Belay it
  • Technology Law Issues for Security Professionals

    Shannon Brown
    Sat, 10:00 - 10:50
    Bring It On room - Bring it On
  • Introduction To Reverse Engineering Software (repeat)

    Frank Poz
    Sat, 10:00 - 10:50
    Georgetown East - Trainer Exchange
  • Introduction To Software Exploits

    Corey Kallenberg
    Sat, 10:00 - 10:50
    Georgetown West - Trainer Exchange
  • 11:00
  • Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms

    Pablo San Emeterio, Jaime Sanchez
    Sat, 11:00 - 11:50
    Build It Room - Build It
  • Unambiguous Encapsulation - Separating Data and Signaling

    Michael Ossmann, Dominic Spill
    Sat, 11:00 - 11:50
    Belay It room - Belay it
  • I Found a Thing and You Can (Should) Too: ISP's Unauthenticated SOAP Service = Find (Almost) All The Things!

    Nicholas Popovich
    Sat, 11:00 - 11:50
    Bring It On room - Bring it On
  • Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration

    Xeno Kovah
    Sat, 11:00 - 11:50
    Georgetown East - Trainer Exchange
  • Exploits 2: Exploitation in the Windows Environment

    Corey Kallenberg
    Sat, 11:00 - 11:50
    Georgetown West - Trainer Exchange
  • 12:00
  • SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography

    Daniel J. Bernstein, Tanja Lange
    Sat, 12:00 - 12:50
    Build It Room - Build It
  • A Critical Review of Spatial Analysis

    David Giametta, Andrew Potter
    Sat, 12:00 - 12:50
    Belay It room - Belay it
  • Arms Race: The Story of (In)-Secure Bootloaders

    Lee Harrison, Kang Li
    Sat, 12:00 - 12:50
    Bring It On room - Bring it On
  • The Life of Binaries

    Xeno Kovah
    Sat, 12:00 - 12:50
    Georgetown East - Trainer Exchange
  • Android Forensics & Security Testing (repeat)

    Jared Ondricek
    Sat, 12:00 - 12:50
    Georgetown West - Trainer Exchange
  • 14:00
  • Controlling USB Flash Drive Controllers: Expose of Hidden Features

    Richard Harman
    Sat, 14:00 - 14:50
    Build It Room - Build It
  • Data Whales and Troll Tears: Beat the Odds in InfoSec

    Allison Miller, Davi Ottenheimer
    Sat, 14:00 - 14:50
    Belay It room - Belay it
  • Syncing Mentorship Between Winners And Beginners

    Liz Dahlstrom, Tarah Wheeler Van Vlack
    Sat, 14:00 - 14:50
    Bring It On room - Bring it On
  • Rootkits: What they are, and how to find them

    Xeno Kovah
    Sat, 14:00 - 14:50
    Georgetown East - Trainer Exchange
  • Introduction to ARM

    Gananand Kini
    Sat, 14:00 - 14:50
    Georgetown West - Trainer Exchange
  • 15:00
  • 0wn the Con

    The Shmoo Group
    Sat, 15:00 - 15:50
    Build It Room - Build It
  • Operationalizing Threat Information Sharing: Beyond Policies and Platitudes

    Sean Barnum, Aharon Chernin
    Sat, 15:00 - 15:50
    Belay It room - Belay it
  • The NSA: Capabilities and Countermeasures

    Bruce Schneier
    Sat, 15:00 - 15:50
    Bring It On room - Bring it On
  • Malware Dynamic Analysis

    Veronica Kovah
    Sat, 15:00 - 15:50
    Georgetown East - Trainer Exchange
  • Flow Analysis & Network Hunting

    Ben Actis
    Sat, 15:00 - 15:50
    Georgetown West - Trainer Exchange
  • 16:00
  • AV Evasion With the Veil Framework

    Will Schroeder, Christopher Truncer, Mike Wright
    Sat, 16:00 - 16:50
    Build It Room - Build It
  • The "Science of Cyber" and the Next Generation of Security Tools

    Paulo Shakarian
    Sat, 16:00 - 16:50
    Belay It room - Belay it
  • How to Train your Snapdragon: Exploring Power Frameworks on Android

    Josh Thomas
    Sat, 16:00 - 16:50
    Bring It On room - Bring it On
  • Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration (repeat)

    Xeno Kovah
    Sat, 16:00 - 16:50
    Georgetown East - Trainer Exchange
  • Pcap Analysis & Network Hunting

    Reid Gilman
    Sat, 16:00 - 16:50
    Georgetown West - Trainer Exchange
  • 17:00
  • ADD -- Complicating Memory Forensics Through Memory Disarray

    Alissa Torres, Jake Williams
    Sat, 17:00 - 17:50
    Build It Room - Build It
  • Timing-Based Attestation: Sexy Defense, or the Sexiest?

    John Butterworth, Corey Kallenberg, Xeno Kovah
    Sat, 17:00 - 17:50
    Belay It room - Belay it
  • LTE vs. Darwin

    Brian Butterly, Hendrik Schmidt
    Sat, 17:00 - 17:50
    Bring It On room - Bring it On
  • Reverse Engineering Malware

    Frank Poz
    Sat, 17:00 - 17:50
    Georgetown East - Trainer Exchange
  • Offensive, Defensive, and Forensic Techniques for Determining Web User Identity

    Zachary Zebrowski
    Sat, 17:00 - 17:50
    Georgetown West - Trainer Exchange
  • 18:00
  • Introduction To Vulnerability Assessment

    Jose Cintron
    Sat, 18:00 - 18:50
    Georgetown East - Trainer Exchange
  • Lessons-Learned in Designing a Training Course for Professionals

    Alfred Ouyang
    Sat, 18:00 - 18:50
    Georgetown West - Trainer Exchange
  • 18:20
  • You Name It, We Analyze It

    Jim Gilsinn
    Sat, 18:20 - 18:40
    Build It Room - Fire Talks
  • 18:40
  • Having Your Cake and Eating It Too: FOIA, Surveillance, and Privacy

    Michael Schearer
    Sat, 18:40 - 19:00
    Build It Room - Fire Talks
  • 19:00
  • Building An Information Security Awareness Program From Scratch

    Bill Gardner
    Sat, 19:00 - 19:20
    Build It Room - Fire Talks
  • 19:20
  • TrendCoins: Making Money on the Bitcoin/Altcoin Trends

    Zac Hinkel
    Sat, 19:20 - 19:40
    Build It Room - Fire Talks
  • 19:40
  • Writing Your Own Disassembler in 15 Minutes

    Jay Little
    Sat, 19:40 - 20:00
    Build It Room - Fire Talks