• 09:00
  • CANCELLED - How to Build the Immune System for the Internet

    Xiaodun Fang
    Thu, 09:00 - 09:25
    Lagoon K
  • Dark Side of the DNS Force

    Erik Wu
    Thu, 09:00 - 09:25
    Lagoon K
  • A Lightbulb Worm?

    Colin O'Flynn
    Thu, 09:00 - 09:25
    Mandalay Bay BCD
  • BadTunnel: How Do I Get Big Brother Power?

    Yang Yu
    Thu, 09:00 - 09:25
    Mandalay Bay EF
  • Dungeons Dragons and Security

    Tiphaine Romand Latapie
    Thu, 09:00 - 09:25
    Mandalay Bay GH
  • PINdemonium: A DBI-Based Generic Unpacker for Windows Executable

    LorenzoFontana, Sebastiano Mariani
    Thu, 09:00 - 09:25
    Jasmine Ballroom
  • Samsung Pay: Tokenized Numbers Flaws and Issues

    Salvador Mendoza
    Thu, 09:00 - 09:25
    South Seas ABE
  • Blunting the Phisher's Spear: A Risk-Based Approach for Defining User Training and Awarding Administrative Privileges

    Arun Vishwanath
    Thu, 09:00 - 09:25
    South Seas CDF
  • What's the DFIRence for ICS?

    JoshTriplett, Chris Sistrunk
    Thu, 09:00 - 09:25
    South Seas GH
  • Keystone Engine: Next Generation Assembler Framework

    Nguyen Anh Quynh
    Thu, 09:00 - 09:25
    South Seas IJ
  • 09:45
  • The Remote Malicious Butler Did It!

    Tal Be'ery, Chaim Hoch
    Thu, 09:45 - 10:35
    Lagoon K
  • Ouroboros: Tearing Xen Hypervisor with the Snake

    Shangcong Luan
    Thu, 09:45 - 10:10
    Mandalay Bay BCD
  • TCP Injection Attacks in the Wild - A Large Scale Study

    Gabi Nakibly
    Thu, 09:45 - 10:35
    Mandalay Bay EF
  • Advanced CAN Injection Techniques for Vehicle Networks

    ChrisValasek, Charlie Miller
    Thu, 09:45 - 10:35
    Mandalay Bay GH
  • Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages

    Anirudh Duggal
    Thu, 09:45 - 10:35
    Jasmine Ballroom
  • The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android

    Nick Kralevich
    Thu, 09:45 - 10:35
    South Seas ABE
  • Windows 10 Segment Heap Internals

    Mark Vincent Yason
    Thu, 09:45 - 10:35
    South Seas CDF
  • Defense at Hyperscale: Technologies and Policies for a Defensible Cyberspace

    Jason Healey
    Thu, 09:45 - 10:35
    South Seas GH
  • HTTP Cookie Hijacking in the Wild: Security and Privacy Implications

    JasonPolakis, Suphannee Sivakorn
    Thu, 09:45 - 10:35
    South Seas IJ
  • 11:00
  • Demystifying the Secure Enclave Processor

    Tarjei Mandt, Mathew Solnik
    Thu, 11:00 - 11:50
    Lagoon K
  • Next-Generation of Exploit Kit Detection by Building Simulated Obfuscators

    Xing Jin, Tongbo Luo
    Thu, 11:00 - 11:25
    Mandalay Bay BCD
  • Investigating DDOS - Architecture Actors and Attribution

    AndreCorrea, Elliott Peterson
    Thu, 11:00 - 11:50
    Mandalay Bay EF
  • Analysis of the Attack Surface of Windows 10 Virtualization-Based Security

    Rafal Wojtczuk
    Thu, 11:00 - 11:50
    Mandalay Bay GH
  • O-checker: Detection of Malicious Documents Through Deviation from File Format Specifications

    Yuhei Otsubo
    Thu, 11:00 - 11:25
    Jasmine Ballroom
  • Hacking Next-Gen ATMs: From Capture to Cashout

    Weston Hecker
    Thu, 11:00 - 11:50
    South Seas ABE
  • Language Properties of Phone Scammers: Cyberdefense at the Level of the Human

    Judith Tabron
    Thu, 11:00 - 11:50
    South Seas CDF
  • The Tao of Hardware the Te of Implants

    Joe FitzPatrick
    Thu, 11:00 - 11:50
    South Seas GH
  • Cunning with CNG: Soliciting Secrets from Schannel

    Jake Kambic
    Thu, 11:00 - 11:50
    South Seas IJ
  • 12:10
  • Hardening AWS Environments and Automating Incident Response for AWS Compromises

    Andrew Krug, Alex McCormack
    Thu, 12:10 - 13:00
    Lagoon K
  • badWPAD

    Maxim Goncharov
    Thu, 12:10 - 12:35
    Mandalay Bay BCD
  • When the Cops Come A-Knocking: Handling Technical Assistance Demands from Law Enforcement

    Jennifer Granick, RianaPfefferkorn
    Thu, 12:10 - 13:00
    Mandalay Bay EF
  • Windows 10 Mitigation Improvements

    Matt Miller, David Weston
    Thu, 12:10 - 13:00
    Mandalay Bay GH
  • Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf

    Xiaolong Bai, Luyi Xing
    Thu, 12:10 - 13:00
    Jasmine Ballroom
  • Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter

    John Seymour, Philip Tully
    Thu, 12:10 - 13:00
    South Seas ABE
  • Horse Pill: A New Type of Linux Rootkit

    Michael Leibowitz
    Thu, 12:10 - 13:00
    South Seas CDF
  • SGX Secure Enclaves in Practice: Security and Crypto Review

    Jean-Philippe Aumasson, LuisMerino
    Thu, 12:10 - 13:00
    South Seas GH
  • AirBnBeware: Short Term Rentals Long Term Pwnage

    Jeremy Galloway
    Thu, 12:10 - 13:00
    South Seas IJ
  • 14:30
  • Iran's Soft-War for Internet Dominance

    CollinAnderson, Claudio Guarnieri
    Thu, 14:30 - 15:20
    Lagoon K
  • The Year in Flash

    Natalie Silvanovich
    Thu, 14:30 - 15:20
    Mandalay Bay BCD
  • Bad for Enterprise: Attacking BYOD Enterprise Mobile Security Solutions

    Vincent Tan
    Thu, 14:30 - 15:20
    Mandalay Bay EF
  • VOIP WARS: The Phreakers Awaken

    Fatih Ozavci
    Thu, 14:30 - 15:20
    Mandalay Bay GH
  • OSS Security Maturity: Time to Put On Your Big Boy Pants!

    Christine Gadsby, Jake Kouns
    Thu, 14:30 - 15:20
    Jasmine Ballroom
  • Web Application Firewalls: Analysis of Detection Logic

    Vladimir Ivanov
    Thu, 14:30 - 15:20
    South Seas ABE
  • Pangu 9 Internals

    Xiaobo Chen, Tielei Wang, Hao Xu
    Thu, 14:30 - 15:20
    South Seas CDF
  • Breaking FIDO: Are Exploits in There?

    Jerrod Chong
    Thu, 14:30 - 14:55
    South Seas GH
  • PLC-Blaster: A Worm Living Solely in the PLC

    HendrikSchwartke, MaikBrüggemann, Ralf Spenneberg
    Thu, 14:30 - 15:20
    South Seas IJ
  • 15:50
  • Breaking Hardware-Enforced Security with Hypervisors

    Joseph Sharkey
    Thu, 15:50 - 16:40
    Lagoon K
  • The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM

    Ralf Hund
    Thu, 15:50 - 16:40
    Mandalay Bay BCD
  • When Governments Attack: State Sponsored Malware Attacks Against Activists Lawyers and Journalists

    Eva Galperin, Cooper Quintin
    Thu, 15:50 - 16:40
    Mandalay Bay EF
  • Behind The Scenes of iOS Security

    Ivan Krstic
    Thu, 15:50 - 16:40
    Mandalay Bay GH
  • The Art of Reverse Engineering Flash Exploits

    Jeongwook Oh
    Thu, 15:50 - 16:40
    Jasmine Ballroom
  • Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency

    Sean Malone
    Thu, 15:50 - 16:40
    South Seas ABE
  • Timing Attacks Have Never Been So Practical: Advanced Cross-Site Search Attacks

    Nethanel Gelernter
    Thu, 15:50 - 16:40
    South Seas CDF
  • DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes

    Rodrigo Rubira Branco, RohitMothe
    Thu, 15:50 - 16:40
    South Seas GH
  • Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic

    JonathanMayer, Travis LeBlanc
    Thu, 15:50 - 16:40
    South Seas IJ
  • 17:00
  • An AI Approach to Malware Similarity Analysis: Mapping the Malware Genome With a Deep Neural Network

    Konstantin Berlin
    Thu, 17:00 - 17:25
    Lagoon K
  • An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems

    Patrick Gage Kelley
    Thu, 17:00 - 17:25
    Mandalay Bay BCD
  • Pay No Attention to That Hacker Behind the Curtain: A Look Inside the Black Hat Network

    Bart Stump, Neil Wyler
    Thu, 17:00 - 17:50
    Mandalay Bay EF
  • Attacking SDN Infrastructure: Are We Ready for the Next-Gen Networking?

    Seungsoo Lee, Changhoon Yoon
    Thu, 17:00 - 17:25
    Mandalay Bay GH
  • Over the Edge: Silently Owning Windows 10's Secure Browser

    Herbert Bos, Erik Bosman, Cristiano Giuffrida, Kaveh Razavi
    Thu, 17:00 - 17:50
    Jasmine Ballroom
  • Using Undocumented CPU Behavior to See into Kernel Mode and Break KASLR in the Process

    Anders Fogh, Daniel Gruss
    Thu, 17:00 - 17:50
    South Seas ABE
  • Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud

    Aude Marzuoli
    Thu, 17:00 - 17:25
    South Seas CDF
  • Dangerous Hare: Hanging Attribute References Hazards Due to Vendor Customization

    Nan Zhang
    Thu, 17:00 - 17:25
    South Seas GH
  • Building Trust & Enabling Innovation for Voice Enabled IoT

    Lynn Terwoerds
    Thu, 17:00 - 17:25
    South Seas IJ