• 09:00
  • The Lifecycle of a Revolution

    Jennifer Granick
    Wed, 09:00 - 10:00
    Mandalay Bay Ballroom
  • 10:20
  • Server-Side Template Injection: RCE for the Modern Web App

    James Kettle
    Wed, 10:20 - 11:10
    Jasmine Ballroom
  • How to Hack Government: Technologists as Policy Makers

    Terrell McSweeny, Ashkan Soltani
    Wed, 10:20 - 11:10
    Lagoon K
  • Internet Plumbing for Security Professionals: The State of BGP Security

    Wim Remes
    Wed, 10:20 - 11:10
    Mandalay Bay BCD
  • Writing Bad @$$ Malware for OS X

    Patrick Wardle
    Wed, 10:20 - 11:10
    Mandalay Bay EF
  • Android Security State of the Union

    Adrian Ludwig
    Wed, 10:20 - 11:10
    Mandalay Bay GH
  • Bring Back the Honeypots

    Haroon Meer, Marco Slaviero
    Wed, 10:20 - 11:10
    South Seas ABE
  • Why Security Data Science Matters and How Its Different: Pitfalls and Promises of Data Science Based Breach Detection and Threat Intelligence

    Joshua Saxe
    Wed, 10:20 - 12:20
    South Seas CDF
  • Spread Spectrum Satcom Hacking: Attacking the GlobalStar Simplex Data Service

    Colby Moore
    Wed, 10:20 - 11:10
    South Seas GH
  • Unicorn: Next Generation CPU Emulator Framework

    Hoang-Vu Dang, Nguyen Anh Quynh
    Wed, 10:20 - 11:10
    South Seas IJ
  • 11:30
  • Emanate Like a Boss: Generalized Covert Data Exfiltration with Funtenna

    Ang Cui
    Wed, 11:30 - 12:20
    Jasmine Ballroom
  • Breaking HTTPS with BGP Hijacking

    Artyom Gavrichenkov
    Wed, 11:30 - 12:20
    Lagoon K
  • Attacking Interoperability - An OLE Edition

    Haifei Li, Bing Sun
    Wed, 11:30 - 12:20
    Mandalay Bay BCD
  • Defeating Pass-the-Hash: Separation of Powers

    Seth Moore, Baris Saydag
    Wed, 11:30 - 12:20
    Mandalay Bay EF
  • Winning the Online Banking War

    Sean Park
    Wed, 11:30 - 12:20
    Mandalay Bay GH
  • Take a Hacker to Work Day - How Federal Prosecutors Use the CFAA

    Leonard Bailey
    Wed, 11:30 - 12:20
    South Seas ABE
  • The Battle for Free Speech on the Internet

    Matthew Prince
    Wed, 11:30 - 12:20
    South Seas GH
  • Understanding and Managing Entropy Usage

    Bruce Potter, Sasha Wood
    Wed, 11:30 - 12:20
    South Seas IJ
  • 13:50
  • Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges

    Halvar Flake, Mark Seaborn
    Wed, 13:50 - 14:40
    Jasmine Ballroom
  • Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing

    Alex Pinto, Alexandre Sieira
    Wed, 13:50 - 14:40
    Lagoon K
  • Adventures in Femtoland: 350 Yuan for Invaluable Fun

    Alexey Osipov, Alexander Zaitsev
    Wed, 13:50 - 14:40
    Mandalay Bay BCD
  • Red vs Blue: Modern Active Directory Attacks Detection and Protection

    Sean Metcalf
    Wed, 13:50 - 14:40
    Mandalay Bay EF
  • GameOver Zeus: Badguys and Backends

    Elliott Peterson, Michael Sandee, Tillmann Werner
    Wed, 13:50 - 14:40
    Mandalay Bay GH
  • SMBv2: Sharing More than Just Your Files

    Hormazd Billimoria, Jonathan Brossard
    Wed, 13:50 - 14:40
    South Seas ABE
  • Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorers Isolated Heap and MemoryProtection

    Brian Gorenc, Abdul-Aziz Hariri, Simon Zuckerbraun
    Wed, 13:50 - 14:40
    South Seas CDF
  • The Tactical Application Security Program: Getting Stuff Done

    David Cintz, Cory Scott
    Wed, 13:50 - 14:40
    South Seas GH
  • These are Not Your Grand Daddys CPU Performance Counters - CPU Hardware Performance Counters for Security

    Anders Fogh, Nishad Herath
    Wed, 13:50 - 14:40
    South Seas IJ
  • 15:00
  • Targeted Takedowns: Minimizing Collateral Damage Using Passive DNS

    Paul Vixie
    Wed, 15:00 - 15:50
    Jasmine Ballroom
  • WSUSpect - Compromising the Windows Enterprise via Windows Update

    Alex Chapman, Paul Stone
    Wed, 15:00 - 15:50
    Lagoon K
  • Stagefright: Scary Code in the Heart of Android

    Joshua Drake
    Wed, 15:00 - 15:50
    Mandalay Bay BCD
  • Remote Exploitation of an Unaltered Passenger Vehicle

    Charlie Miller, Christopher Valasek
    Wed, 15:00 - 15:50
    Mandalay Bay EF
  • Big Game Hunting: The Peculiarities of Nation-State Malware Research

    Claudio Guarnieri, Morgan Marquis-Boire, Marion Marschalek
    Wed, 15:00 - 15:50
    Mandalay Bay GH
  • Back Doors and Front Doors Breaking the Unbreakable System

    James Denaro, Matthew Green
    Wed, 15:00 - 15:50
    South Seas ABE
  • Switches Get Stitches

    Colin Cassidy, Robert M. Lee, Éireann Leverett
    Wed, 15:00 - 15:50
    South Seas CDF
  • Distributing the Reconstruction of High-Level Intermediate Representation for Large Scale Malware Analysis

    Gabriel Negreira Barbosa, Rodrigo Rubira Branco, Alexander Matrosov, Eugene Rodionov
    Wed, 15:00 - 15:50
    South Seas GH
  • Stranger Danger! What is the Risk from 3rd Party Libraries?

    Jake Kouns
    Wed, 15:00 - 15:50
    South Seas IJ
  • 16:20
  • The Little Pump Gauge that Could: Attacks Against Gas Pump Monitoring Systems

    Stephen Hilt, Kyle Wilhoit
    Wed, 16:20 - 17:10
    Jasmine Ballroom
  • Faux Disk Encryption: Realities of Secure Storage on Mobile Devices

    Daniel A. Mayer, Drew Suarez
    Wed, 16:20 - 17:10
    Lagoon K
  • Optimized Fuzzing IOKit in iOS

    Lei Long, Aimin Pan, Peng Xiao
    Wed, 16:20 - 17:10
    Mandalay Bay BCD
  • Abusing Windows Management Instrumentation (WMI) to Build a Persistent Asynchronous and Fileless Backdoor

    Matthew Graeber
    Wed, 16:20 - 17:10
    Mandalay Bay EF
  • Attacking Hypervisors Using Firmware and Hardware

    Oleksandr Bazhaniuk, Yuriy Bulygin, Mikhail Gorobets, Alexander Matrosov
    Wed, 16:20 - 17:10
    Mandalay Bay GH
  • Crash & Pay: How to Own and Clone Contactless Payment Devices

    Peter Fillmore
    Wed, 16:20 - 17:10
    South Seas ABE
  • Securing Your Big Data Environment

    Ajit Gaddam
    Wed, 16:20 - 17:10
    South Seas CDF
  • Panel: Getting It Right: Straight Talk on Threat & Information Sharing

    Kevin Bankston, Rebekah Brown, Brian Engle, Trey Ford, Mark Hammell
    Wed, 16:20 - 17:10
    South Seas GH
  • Behind the Mask: The Agenda Tricks and Tactics of the Federal Trade Commission as they Regulate Cybersecurity

    Michael Daugherty
    Wed, 16:20 - 17:10
    South Seas IJ
  • 17:30
  • The Nodejs Highway: Attacks are at Full Throttle

    Amit Ashbel, Maty Siman
    Wed, 17:30 - 18:00
    Jasmine Ballroom
  • Subverting Satellite Receivers for Botnet and Profit

    Sofiane Talmat
    Wed, 17:30 - 18:00
    Lagoon K
  • Graphic Content Ahead: Towards Automated Scalable Analysis of Graphical Images Embedded in Malware

    Alex Long
    Wed, 17:30 - 18:00
    Mandalay Bay BCD
  • Cloning 3G/4G SIM Cards with a PC and an Oscilloscope: Lessons Learned in Physical Security

    Yu Yu
    Wed, 17:30 - 18:00
    Mandalay Bay EF
  • Commercial Mobile Spyware - Detecting the Undetectable

    Joshua Dalman, Valerie Hantke
    Wed, 17:30 - 18:00
    Mandalay Bay GH
  • How Vulnerable are We to Scams?

    Markus Jakobsson, Ting-Fang Yen
    Wed, 17:30 - 18:00
    South Seas ABE
  • Attacking ECMAScript Engines with Redefinition

    Natalie Silvanovich
    Wed, 17:30 - 18:00
    South Seas CDF
  • Mobile Point of Scam: Attacking the Square Reader

    Artem Losev, Alexandrea Mellen, John Moore
    Wed, 17:30 - 18:00
    South Seas GH
  • THIS IS DeepERENT: Tracking App Behaviors with (Nothing Changed) Phone for Evasive Android Malware

    Jun Young Choi, Yeongung Park
    Wed, 17:30 - 18:00
    South Seas IJ