• 10:00
  • An Open and Affordable USB Man in the Middle Device

    Dominic Spill
    Sun, 10:00 - 10:50
    Build It Room - Build It
  • "How I Met Your Mother" or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age

    Benjamin Gatti
    Sun, 10:00 - 10:50
    Belay It room - Belay it
  • Malicious Online Activities Related to the 2012 U.S. General Election

    Joshua Franklin, Matthew Jablonski, Dr. Damon McCoy, Robert Tarlecki
    Sun, 10:00 - 10:50
    Bring It On room - Bring it On
  • 11:00
  • unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback

    Lee Harrison, Kang Li, Xiaoning Li
    Sun, 11:00 - 11:50
    Build It Room - Build It
  • Raising Costs for Your Attackers Instead of Your CFO

    Aaron Beuhring, Kyle Salous
    Sun, 11:00 - 11:50
    Belay It room - Belay it
  • Vehicle Forensics - The Data Beyond the Dashboard

    Courtney Lancaster
    Sun, 11:00 - 11:50
    Bring It On room - Bring it On
  • 12:00
  • Introducing idb - Simplified Blackbox iOS App Pentesting

    Daniel A. Mayer
    Sun, 12:00 - 12:20
    Build It Room - Build It
  • Practical Applications of Data Science in Detection

    Mike Sconzo, Brian Wylie
    Sun, 12:00 - 12:50
    Belay It room - Belay it
  • You Don't Have the Evidence

    Scott Moulton
    Sun, 12:00 - 12:50
    Bring It On room - Bring it On
  • 13:30
  • Large Scale Network and Application Scanning

    Alejandro Caceres, Rob Graham, Paul McMillan, Bruce Potter, Dan Tentler
    Sun, 13:30 - 14:20
    Main Room - One Track Mind
  • 14:30
  • Closing Remarks

    Bruce Potter
    Sun, 14:30 - 15:20
    Main Room - One Track Mind