• 09:00
  • The Hidden Architecture of our Time: Why This Internet Worked How We Could Lose It and the Role Hackers Play

    Dan Kaminsky
    Wed, 09:00 - 10:00
    Lagoon K
  • 10:20
  • Abusing Bleeding Edge Web Standards for AppSec Glory

    Ryan Lester, Bryant Zadegan
    Wed, 10:20 - 11:10
    Lagoon K
  • Breaking Payment Points of Interaction (POI)

    Nir Valtman, Patrick Watson
    Wed, 10:20 - 11:10
    Mandalay Bay BCD
  • The Linux Kernel Hidden Inside Windows 10

    Alex Ionescu
    Wed, 10:20 - 11:10
    Mandalay Bay EF
  • Beyond the MCSE: Active Directory for the Security Professional

    Sean Metcalf
    Wed, 10:20 - 11:10
    Mandalay Bay GH
  • Capturing 0day Exploits with PERFectly Placed Hardware Traps

    Kenneth Fitch, Cody Pierce, Matt Spisak
    Wed, 10:20 - 11:10
    Jasmine Ballroom
  • HTTP/2 & QUIC - Teaching Good Protocols To Do Bad Things

    Catherine Pearce, Carl Vincent
    Wed, 10:20 - 11:10
    South Seas ABE
  • Can You Trust Me Now? An Exploration into the Mobile Threat Landscape

    Josh Thomas
    Wed, 10:20 - 11:10
    South Seas CDF
  • A Retrospective on the Use of Export Cryptography

    David Adrian
    Wed, 10:20 - 11:10
    South Seas GH
  • Augmenting Static Analysis Using Pintool: Ablation

    Paul Mehta
    Wed, 10:20 - 11:10
    South Seas IJ
  • 11:30
  • Hackproofing Oracle eBusiness Suite

    David Litchfield
    Wed, 11:30 - 12:20
    Lagoon K
  • Memory Forensics Using Virtual Machine Introspection for Cloud Computing

    Tobias Zillner
    Wed, 11:30 - 11:55
    Mandalay Bay BCD
  • $hell on Earth: From Browser to System Compromise

    Abdul-Aziz Hariri, JasielSpelman, Matt Molinyawe, Joshua Smith
    Wed, 11:30 - 12:20
    Mandalay Bay EF
  • Subverting Apple Graphics: Practical Approaches to Remotely Gaining Root

    Liang Chen, Marco Grassi, Qidan He, YubinFu
    Wed, 11:30 - 12:20
    Mandalay Bay GH
  • A Journey from JNDI/LDAP Manipulation to Remote Code Execution Dream Land

    Oleksandr Mirosh, Alvaro Munoz
    Wed, 11:30 - 12:20
    Jasmine Ballroom
  • Exploiting Curiosity and Context: How to Make People Click on a Dangerous Link Despite Their Security Awareness

    Zinaida Benenson
    Wed, 11:30 - 12:20
    South Seas ABE
  • Applied Machine Learning for Data Exfil and Other Fun Topics

    Brian Wallace, Matt Wolff, Xuan Zhao
    Wed, 11:30 - 12:20
    South Seas CDF
  • Measuring Adversary Costs to Exploit Commercial Software: The Government- Bootstrapped Non-Profit C.I.T.L.

    Mudge ., Sarah Zatko
    Wed, 11:30 - 12:20
    South Seas GH
  • Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS

    Hanno Böck, Sean Devlin, PhilippJovanovic, Aaron Zauner
    Wed, 11:30 - 12:20
    South Seas IJ
  • 13:50
  • Drone Attacks on Industrial Wireless: A New Front in Cyber Security

    Jeff Melrose
    Wed, 13:50 - 14:40
    Lagoon K
  • Towards a Holistic Approach in Building Intelligence to Fight Crimeware

    Dhia Mahjoub, Thomas Mathew, Mykhailo Sakaly
    Wed, 13:50 - 14:40
    Mandalay Bay BCD
  • Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools

    Wesley McGrew
    Wed, 13:50 - 14:40
    Mandalay Bay EF
  • Xenpwn: Breaking Paravirtualized Devices

    Felix Wilhelm
    Wed, 13:50 - 14:40
    Mandalay Bay GH
  • Adaptive Kernel Live Patching: An Open Collaborative Effort to Ameliorate Android N-Day Root Exploits

    Tao Wei, Yulong Zhang
    Wed, 13:50 - 14:40
    Jasmine Ballroom
  • HEIST: HTTP Encrypted Information can be Stolen Through TCP-Windows

    Tom Van Goethem, MathyVanhoef
    Wed, 13:50 - 14:40
    South Seas ABE
  • CANSPY: A Platform for Auditing CAN Devices

    Jonathan-Christofer Demay, Arnaud Lebrun
    Wed, 13:50 - 14:40
    South Seas CDF
  • GATTacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool

    Slawomir Jasek
    Wed, 13:50 - 14:15
    South Seas GH
  • Certificate Bypass: Hiding and Executing Malware from a Digitally Signed Executable

    Tom Nipravsky
    Wed, 13:50 - 14:15
    South Seas IJ
  • 15:00
  • An Insider's Guide to Cyber-Insurance and Security Guarantees

    Jeremiah Grossman
    Wed, 15:00 - 15:50
    Lagoon K
  • Pwning Your Java Messaging with Deserialization Vulnerabilities

    Matthias Kaiser
    Wed, 15:00 - 15:50
    Mandalay Bay BCD
  • Does Dropping USB Drives in Parking Lots and Other Places Really Work?

    Elie Bursztein
    Wed, 15:00 - 15:50
    Mandalay Bay EF
  • AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It

    Nikhil Mittal
    Wed, 15:00 - 15:50
    Mandalay Bay GH
  • Intra-Process Memory Protection for Applications on ARM and x86: Leveraging the ELF ABI

    Julian Bangert, Sergey Bratus, Maxwell Koo
    Wed, 15:00 - 15:50
    Jasmine Ballroom
  • 1000 Ways to Die in Mobile OAuth

    Eric Chen, Shuo Chen, Robert Kotcher, Patrick Tague, Yuan Tian, YutongPei
    Wed, 15:00 - 15:50
    South Seas ABE
  • Recover a RSA Private Key from a TLS Session with Perfect Forward Secrecy

    Marco Ortisi
    Wed, 15:00 - 15:50
    South Seas CDF
  • I Came to Drop Bombs: Auditing the Compression Algorithm Weapon Cache

    Cara Marie
    Wed, 15:00 - 15:25
    South Seas GH
  • Into The Core - In-Depth Exploration of Windows 10 IoT Core

    Paul Sabanal
    Wed, 15:00 - 15:50
    South Seas IJ
  • 16:20
  • Design Approaches for Security Automation

    Peleus Uhley
    Wed, 16:20 - 17:10
    Lagoon K
  • Crippling HTTPS with Unholy PAC

    Amit Klein, Itzik Kotler
    Wed, 16:20 - 17:10
    Mandalay Bay BCD
  • Access Keys Will Kill You Before You Kill the Password

    Loic Simon
    Wed, 16:20 - 16:45
    Mandalay Bay EF
  • Account Jumping Post Infection Persistency & Lateral Movement in AWS

    Dan Amiga, Dor Knafo
    Wed, 16:20 - 17:10
    Mandalay Bay GH
  • Captain Hook: Pirating AVs to Bypass Exploit Mitigations

    Tomer Bitton, Udi Yavo
    Wed, 16:20 - 17:10
    Jasmine Ballroom
  • Using EMET to Disable EMET

    Abdulellah Alsaheel, RaghavPande
    Wed, 16:20 - 17:10
    South Seas ABE
  • Viral Video - Exploiting SSRF in Video Converters

    Nikolay Ermishkin, MaximAndreev
    Wed, 16:20 - 17:10
    South Seas CDF
  • GreatFET: Making GoodFET Great Again

    Michael Ossmann
    Wed, 16:20 - 17:10
    South Seas GH
  • Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX

    Yeongjin Jang, Taesoo Kim, Sangho Lee
    Wed, 16:20 - 17:10
    South Seas IJ
  • 17:30
  • Watching Commodity Malware Get Sold to a Targeted Actor

    Israel Barak
    Wed, 17:30 - 18:00
    Lagoon K
  • Building a Product Security Incident Response Team: Learnings from the Hivemind

    Kymberlee Price
    Wed, 17:30 - 18:00
    Mandalay Bay BCD
  • Unleash the Infection Monkey: A Modern Alternative to Pen-Tests

    Ofri Ziv
    Wed, 17:30 - 18:00
    Mandalay Bay EF
  • Security Through Design - Making Security Better by Designing for People

    Jelle Niemantsverdriet
    Wed, 17:30 - 18:00
    Mandalay Bay GH
  • Brute-Forcing Lockdown Harddrive PIN Codes

    Colin O'Flynn
    Wed, 17:30 - 18:00
    Jasmine Ballroom
  • Cyber War in Perspective: Analysis from the Crisis in Ukraine

    Kenneth Geers
    Wed, 17:30 - 18:00
    South Seas ABE
  • Side-Channel Attacks on Everyday Applications

    Taylor Hornby
    Wed, 17:30 - 18:00
    South Seas CDF
  • AVLeak: Fingerprinting Antivirus Emulators for Advanced Malware Evasion

    Alex Bulazel
    Wed, 17:30 - 18:00
    South Seas GH
  • The Risk from Power Lines: How to Sniff the G3 and Prime Data and Detect the Interfere Attack

    Lei Ji, Yunding Jian
    Wed, 17:30 - 18:00
    South Seas IJ