• 09:00
  • The Applications of Deep Learning on Traffic Identification

    Chuanming Huang, Bo Liu, Zhanyi Wang, Zhuo Zhang
    Thu, 09:00 - 09:25
    Jasmine Ballroom
  • CrackLord: Maximizing Password Cracking Boxes

    Michael McAtee, Lucas Morris
    Thu, 09:00 - 09:25
    Lagoon K
  • Remote Physical Damage 101 - Bread and Butter Attacks

    Jason Larsen
    Thu, 09:00 - 09:25
    Mandalay Bay BCD
  • Attacking Your Trusted Core: Exploiting Trustzone on Android

    Di Shen
    Thu, 09:00 - 09:25
    Mandalay Bay EF
  • TrustKit: Code Injection on iOS 8 for the Greater Good

    Eric Castro, Angela On-kit Chow, Alban Diquet
    Thu, 09:00 - 09:25
    Mandalay Bay GH
  • ROPInjector: Using Return Oriented Programming for Polymorphism and Antivirus Evasion

    Christoforos Ntantogian, Giorgos Poulios, Christos Xenakis
    Thu, 09:00 - 09:25
    South Seas ABE
  • My Bro the ELK: Obtaining Context from Security Events

    Travis Smith
    Thu, 09:00 - 09:25
    South Seas CDF
  • Exploiting XXE Vulnerabilities in File Parsing Functionality

    Will Vandevanter
    Thu, 09:00 - 09:25
    South Seas GH
  • Taxonomic Modeling of Security Threats in Software Defined Networking

    Jennia Hizver
    Thu, 09:00 - 09:25
    South Seas IJ
  • 09:45
  • Battle of the SKM and IUM: How Windows 10 Rewrites OS Architecture

    Alex Ionescu
    Thu, 09:45 - 10:35
    Jasmine Ballroom
  • Web Timing Attacks Made Practical

    Jason Morgan, Timothy Morgan
    Thu, 09:45 - 10:35
    Lagoon K
  • Repurposing OnionDuke: A Single Case Study Around Reusing Nation State Malware

    Joshua Pitts
    Thu, 09:45 - 10:35
    Mandalay Bay BCD
  • The NSA Playset: A Year of Toys and Tools

    Michael Ossmann
    Thu, 09:45 - 10:35
    Mandalay Bay EF
  • The Memory Sinkhole - Unleashing an x86 Design Flaw Allowing Universal Privilege Escalation

    Christopher Domas
    Thu, 09:45 - 10:35
    Mandalay Bay GH
  • Bringing a Cannon to a Knife Fight

    Johannes Gilger, Adam Kozy
    Thu, 09:45 - 10:35
    South Seas ABE
  • Certifi-gate: Front-Door Access to Pwning Millions of Androids

    Avi Bashan, Ohad Bobrov
    Thu, 09:45 - 10:35
    South Seas CDF
  • Bypass Surgery Abusing Content Delivery Networks with Server-Side-Request Forgery (SSRF) Flash and DNS

    Michael Brooks, Matthew Bryant
    Thu, 09:45 - 10:35
    South Seas GH
  • The Kali Linux Dojo Workshop #1: Rolling Your Own - Generating Custom Kali Linux 20 ISOs

    Mati Aharoni
    Thu, 09:45 - 10:35
    South Seas IJ
  • 11:00
  • Taking Event Correlation with You

    Rob King
    Thu, 11:00 - 11:50
    Jasmine Ballroom
  • Breaking Access Controls with BLEKey

    Mark Baseggio, Eric Evenchick
    Thu, 11:00 - 11:50
    Lagoon K
  • Panel: How the Wassenaar Arrangements Export Control of Intrusion Software Affects the Security Industry

    Collin Anderson, Nate Cardozo, Adriel Desautels, Katie Moussouris, Kim Zetter, Dino Dai Zovi
    Thu, 11:00 - 11:50
    Mandalay Bay BCD
  • Defeating Machine Learning: What Your Security Vendor is Not Telling You

    Bob Klein, Ryan Peters
    Thu, 11:00 - 11:50
    Mandalay Bay EF
  • Ah! Universal Android Rooting is Back

    Wen Xu
    Thu, 11:00 - 11:50
    Mandalay Bay GH
  • How to Implement IT Security After a Cyber Meltdown

    Christina Kubecka
    Thu, 11:00 - 11:50
    South Seas ABE
  • Return to Where? You Cant Exploit What You Cant Find

    Stephen Crane, Andrei Homescu, Christopher Liebchen, Ahmad-Reza Sadeghi
    Thu, 11:00 - 11:50
    South Seas CDF
  • Staying Persistent in Software Defined Networks

    Gregory Pickett
    Thu, 11:00 - 11:50
    South Seas GH
  • The Kali Linux Dojo Workshop #2: Kali USB Setups with Persistent Stores and LUKS Nuke Support

     
    Thu, 11:00 - 11:50
    South Seas IJ
  • 12:10
  • Internet-Facing PLCs - A New Back Orifice

    Johannes Klick, Stephan Lau, Jan-Ole Malchow, Daniel Marzin, Volker Roth
    Thu, 12:10 - 13:00
    Jasmine Ballroom
  • Forging the USB Armory an Open Source Secure Flash-Drive-Sized Computer

    Andrea Barisani, Daniele Bianco
    Thu, 12:10 - 13:00
    Lagoon K
  • Information Access and Information Sharing: Where We are and Where We are Going

    Alejandro Mayorkas
    Thu, 12:10 - 13:00
    Mandalay Bay BCD
  • From False Positives to Actionable Analysis: Behavioral Intrusion Detection Machine Learning and the SOC

    Joseph Zadeh
    Thu, 12:10 - 13:00
    Mandalay Bay EF
  • Fingerprints on Mobile Devices: Abusing and Leaking

    Tao Wei, Yulong Zhang
    Thu, 12:10 - 13:00
    Mandalay Bay GH
  • ZigBee Exploited the Good the Bad and the Ugly

    Sebastian Strobl, Tobias Zillner
    Thu, 12:10 - 13:00
    South Seas ABE
  • Bypass Control Flow Guard Comprehensively

    Yunhai Zhang
    Thu, 12:10 - 13:00
    South Seas CDF
  • Breaking Honeypots for Fun and Profit

    Gadi Evron, Itamar Sher, Dean Sysman
    Thu, 12:10 - 13:00
    South Seas GH
  • BGP Stream

    Dan Hubbard, Andree Toonk
    Thu, 12:10 - 13:00
    South Seas IJ
  • 14:30
  • Internet-Scale File Analysis

    Zachary Hanif, Tamas Lengyel, George Webster
    Thu, 14:30 - 15:20
    Jasmine Ballroom
  • When IoT Attacks: Hacking a Linux-Powered Rifle

    Michael Auger, Runa A. Sandvik
    Thu, 14:30 - 15:20
    Lagoon K
  • Is the NSA Still Listening to Your Phone Calls? A Surveillance Debate: Congressional Success or Epic Fail

    Jamil Jaffer, Mark Jaycox
    Thu, 14:30 - 15:20
    Mandalay Bay BCD
  • Automated Human Vulnerability Scanning with AVA

    Laura Bell
    Thu, 14:30 - 15:20
    Mandalay Bay EF
  • Pen Testing a City

    Greg Conti, Tom Cross, David Raymond
    Thu, 14:30 - 15:20
    Mandalay Bay GH
  • Broadcasting Your Attack: Security Testing DAB Radio in Cars

    Andy Davis
    Thu, 14:30 - 15:20
    South Seas ABE
  • Assessing and Exploiting BigNum Vulnerabilities

    Ralf-Philipp Weinmann
    Thu, 14:30 - 15:20
    South Seas CDF
  • Understanding the Attack Surface and Attack Resilience of Project Spartans New EdgeHTML Rendering Engine

    Mark Yason
    Thu, 14:30 - 15:20
    South Seas GH
  • Review and Exploit Neglected Attack Surfaces in iOS 8

    Xiaobo Chen, Tielei Wang, HAO XU
    Thu, 14:30 - 15:20
    South Seas IJ
  • 15:50
  • ThunderStrike 2: Sith Strike

    Trammel Hudson, Corey Kallenberg, Xeno Kovah
    Thu, 15:50 - 16:40
    Jasmine Ballroom
  • Abusing XSLT for Practical Attacks

    Fernando Arnaboldi
    Thu, 15:50 - 16:40
    Lagoon K
  • Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion

    Marina Krotofil
    Thu, 15:50 - 16:40
    Mandalay Bay BCD
  • Advanced IC Reverse Engineering Techniques: In Depth Analysis of a Modern Smart Card

    Olivier Thomas
    Thu, 15:50 - 16:40
    Mandalay Bay EF
  • Social Engineering the Windows Kernel: Finding and Exploiting Token Handling Vulnerabilities

    James Forshaw
    Thu, 15:50 - 16:40
    Mandalay Bay GH
  • Deep Learning on Disassembly

    Andrew Davis, Matt Wolff
    Thu, 15:50 - 16:40
    South Seas ABE
  • HI THIS IS URGENT PLZ FIX ASAP: Critical Vulnerabilities and Bug Bounty Programs

    Kymberlee Price
    Thu, 15:50 - 16:40
    South Seas CDF
  • Using Static Binary Analysis to Find Vulnerabilities and Backdoors in Firmware

    Christopher Kruegel, Yan Shoshitaishvili
    Thu, 15:50 - 16:40
    South Seas GH
  • Breaking Payloads with Runtime Code Stripping and Image Freezing

    Collin Mulliner, Matthias Neugschwandtner
    Thu, 15:50 - 16:40
    South Seas IJ
  • 17:00
  • Dom Flow - Untangling the DOM for More Easy-Juicy Bugs

    Ahamed Nafeez
    Thu, 17:00 - 18:00
    Jasmine Ballroom
  • Fuzzing Android System Services by Binder Call to Escalate Privilege

    Guang Gong
    Thu, 17:00 - 17:25
    Lagoon K
  • Harnessing Intelligence from Malware Repositories

    Arun Lakhotia, Vivek Notani
    Thu, 17:00 - 18:00
    Mandalay Bay BCD
  • Most Ransomware Isnt as Complex as You Might Think

    Engin Kirda
    Thu, 17:00 - 17:25
    Mandalay Bay EF
  • FileCry - The New Age of XXE

    Sergey Gorbaty, Xiaoran Wang
    Thu, 17:00 - 18:00
    Mandalay Bay GH
  • Exploiting Out-of-Order Execution for Covert Cross-VM Communication

    Sophia D'Antoine
    Thu, 17:00 - 17:25
    South Seas ABE
  • Hidden Risks of Biometric Identifiers and How to Avoid Them

    Tom Keenan
    Thu, 17:00 - 18:00
    South Seas CDF
  • API Deobfuscator: Resolving Obfuscated API Functions in Modern Packers

    Seokwoo Choi
    Thu, 17:00 - 18:00
    South Seas GH
  • Dance Like Nobodys Watching Encrypt Like Everyone Is: A Peek Inside the Black Hat Network

    Bart Stump, Neil Wyler
    Thu, 17:00 - 18:00
    South Seas IJ