• 09:00
  • Stepping Up Our Game: Re-focusing the Security Community on Defense and Making Security Work for Everyone

    Alex Stamos
    Wed, 09:00 - 10:00
    Mandalay Bay Events Center
  • 10:30
  • Web Cache Deception Attack

    Omer Gil
    Wed, 10:30 - 10:55
    Jasmine Ballroom
  • Adventures in Attacking Wind Farm Control Networks

    Jason Staggs
    Wed, 10:30 - 10:55
    Lagoon ABCGHI
  • Wire Me Through Machine Learning

    Ankit Singh, Vijay Thaware
    Wed, 10:30 - 10:55
    Lagoon DEFJKL
  • Orange is the New Purple - How and Why to Integrate Development Teams with Red/Blue Teams to Build More Secure Software

    April C. Wright
    Wed, 10:30 - 10:55
    Mandalay Bay AB
  • PEIMA: Harnessing Power Laws to Detect Malicious Activities from Denial of Service to Intrusion Detection Traffic Analysis and Beyond

    Stefan Prandl
    Wed, 10:30 - 10:55
    Mandalay Bay CD
  • Breaking Electronic Door Locks Like You're on CSI: Cyber

    Colin O'Flynn
    Wed, 10:30 - 10:55
    Mandalay Bay EF
  • Ichthyology: Phishing as a Science

    Karla Burnett
    Wed, 10:30 - 10:55
    Mandalay Bay GH
  • All Your SMS & Contacts Belong to ADUPS & Others

    Azzedine Benameur, Ryan Johnson, Angelos Stavrou
    Wed, 10:30 - 10:55
    South Seas ABE
  • They're Coming for Your Tools: Exploiting Design Flaws for Active Intrusion Prevention

    John Ventura
    Wed, 10:30 - 10:55
    South Seas CDF
  • 11:15
  • FlowFuzz - A Framework for Fuzzing OpenFlow-Enabled Software and Hardware Switches

    Nicholas Gray, Manuel Sommer, Phuoc Tran-Gia, Thomas Zinner
    Wed, 11:15 - 12:05
    Jasmine Ballroom
  • Industroyer/Crashoverride: Zero Things Cool About a Threat Group Targeting the Power Grid

    Anton Cherepanov, Robert M. Lee, Robert Lipovsky, Ben Miller, Joe Slowik
    Wed, 11:15 - 12:05
    Lagoon ABCGHI
  • Real Humans Simulated Attacks: Usability Testing with Attack Scenarios

    Lorrie Cranor
    Wed, 11:15 - 12:05
    Lagoon DEFJKL
  • Many Birds One Stone: Exploiting a Single SQLite Vulnerability Across Multiple Software

    Siji Feng, Kun Yang, Zhi Zhou
    Wed, 11:15 - 12:05
    Mandalay Bay AB
  • Taking DMA Attacks to the Next Level: How to do Arbitrary Memory Reads/Writes in a Live and Unmodified System Using a Rogue Memory Controller

    Dan Lake, Anna Trikalinou
    Wed, 11:15 - 12:05
    Mandalay Bay CD
  • Splunking Dark Tools - A Pentesters Guide to Pwnage Visualization

    Nathan Bates, Bryce Kunz
    Wed, 11:15 - 12:05
    Mandalay Bay EF
  • New Adventures in Spying 3G and 4G Users: Locate Track & Monitor

    Ravishankar Borgaonkar, Lucca Hirschi, Andrew Martin, Shinjo Park, Jean-Pierre Seifert, Altaf Shaik
    Wed, 11:15 - 12:05
    Mandalay Bay GH
  • When IoT Attacks: Understanding the Safety Risks Associated with Connected Devices

    Jonathan Butts, Billy Rios
    Wed, 11:15 - 12:05
    South Seas ABE
  • The Avalanche Takedown: Landslide for Law Enforcement

    Tom Grasso
    Wed, 11:15 - 12:05
    South Seas CDF
  • 13:30
  • Hacking Serverless Runtimes: Profiling AWS Lambda Azure Functions and More

    Graham Jones, Andrew Krug
    Wed, 13:30 - 14:20
    Jasmine Ballroom
  • Taking Windows 10 Kernel Exploitation to the Next Level – Leveraging Write-What-Where Vulnerabilities in Creators Update

    Morten Schenk
    Wed, 13:30 - 14:20
    Lagoon ABCGHI
  • SS7 Attacker Heaven Turns into Riot: How to Make Nation-State and Intelligence Attackers' Lives Much Harder on Mobile Networks

    Martin Kacer, Philippe Langlois
    Wed, 13:30 - 14:20
    Lagoon DEFJKL
  • Challenges of Cooperation Across Cyberspace

    Khoo Boon Hui, Marina Kaljurand, Wolfgang Kleinwachter, Jeff Moss, Joseph Nye, Bill Woodcock
    Wed, 13:30 - 14:20
    Mandalay Bay AB
  • Delivering Javascript to World+Dog

    Kyle Randolph
    Wed, 13:30 - 14:20
    Mandalay Bay CD
  • Hacking Hardware with a \$10 SD Card Reader

    Amir Etemadieh, CJ Heres, Khoa Hoang
    Wed, 13:30 - 14:20
    Mandalay Bay EF
  • The Active Directory Botnet

    Paul Kalinin, Ty Miller
    Wed, 13:30 - 14:20
    Mandalay Bay GH
  • Network Automation is Not Your Safe Haven: Protocol Analysis and Vulnerabilities of Autonomic Network

    Omar Eissa
    Wed, 13:30 - 14:20
    South Seas ABE
  • How We Created the First SHA-1 Collision and What it Means for Hash Security

    Elie Bursztein
    Wed, 13:30 - 14:20
    South Seas CDF
  • 14:40
  • Bochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking

    Mateusz Jurczyk
    Wed, 14:40 - 15:30
    Jasmine Ballroom
  • Automated Testing of Crypto Software Using Differential Fuzzing

    Jean-Philippe Aumasson, Yolan Romailler
    Wed, 14:40 - 15:30
    Lagoon ABCGHI
  • Fractured Backbone: Breaking Modern OS Defenses with Firmware Attacks

    Oleksandr Bazhaniuk, Yuriy Bulygin, Andrew Furtak, Mikhail Gorobets
    Wed, 14:40 - 15:30
    Lagoon DEFJKL
  • ShieldFS: The Last Word in Ransomware Resilient File Systems

    Alessandro Barenghi, Andrea Continella, Alessandro Guagnelli, Federico Maggi, Giulio De Pasquale, Stefano Zanero, Giovanni Zingaro
    Wed, 14:40 - 15:30
    Mandalay Bay AB
  • So You Want to Market Your Security Product...

    Aaron Alva, Terrell McSweeny
    Wed, 14:40 - 15:30
    Mandalay Bay CD
  • The Art of Securing 100 Products

    Nir Valtman
    Wed, 14:40 - 15:30
    Mandalay Bay EF
  • Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game

    Kelly Shortridge
    Wed, 14:40 - 15:30
    Mandalay Bay GH
  • An ACE Up the Sleeve: Designing Active Directory DACL Backdoors

    Andy Robbins, Will Schroeder
    Wed, 14:40 - 15:30
    South Seas ABE
  • What's on the Wireless? Automating RF Signal Identification

    Michael Ossmann, Dominic Spill
    Wed, 14:40 - 15:30
    South Seas CDF
  • 16:00
  • Go Nuclear: Breaking Radiation Monitoring Devices

    Ruben Santamarta
    Wed, 16:00 - 16:50
    Jasmine Ballroom
  • Fighting the Previous War (aka: Attacking and Defending in the Era of the Cloud)

    Haroon Meer, Marco Slaviero
    Wed, 16:00 - 16:50
    Lagoon ABCGHI
  • Developing Trust and Gitting Betrayed

    Noah Beddome, Clint Gibler
    Wed, 16:00 - 16:50
    Lagoon DEFJKL
  • Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev

    Norman Barbosa, Harold Chun
    Wed, 16:00 - 16:50
    Mandalay Bay AB
  • WSUSpendu: How to Hang WSUS Clients

    Romain Coltel, Yves Le Provost
    Wed, 16:00 - 16:50
    Mandalay Bay CD
  • White Hat Privilege: The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data

    Karen Neuman, Jacob Osborn
    Wed, 16:00 - 16:50
    Mandalay Bay EF
  • Cracking the Lens: Targeting HTTP's Hidden Attack-Surface

    James Kettle
    Wed, 16:00 - 16:50
    Mandalay Bay GH
  • What They're Teaching Kids These Days: Comparing Security Curricula and Accreditations to Industry Needs

    Rob Olson, Chaim Sanders
    Wed, 16:00 - 16:50
    South Seas ABE
  • Evilsploit – A Universal Hardware Hacking Toolkit

    Chui Yew Leong, Mingming Wan
    Wed, 16:00 - 16:50
    South Seas CDF
  • 17:05
  • Protecting Visual Assets: Digital Image Counter-Forensics

    Kenneth Brown, Nikita Mazurov
    Wed, 17:05 - 17:30
    Jasmine Ballroom
  • Intercepting iCloud Keychain

    Alexandru Radocea
    Wed, 17:05 - 17:30
    Lagoon ABCGHI
  • Offensive Malware Analysis: Dissecting OSX/FruitFly via a Custom C&C Server

    Patrick Wardle
    Wed, 17:05 - 17:30
    Lagoon DEFJKL
  • Fighting Targeted Malware in the Mobile Ecosystem

    Andrew Blaich, Megan Ruthven
    Wed, 17:05 - 17:30
    Mandalay Bay AB
  • (in)Security in Building Automation: How to Create Dark Buildings with Light Speed

    Thomas Brandstetter
    Wed, 17:05 - 17:30
    Mandalay Bay CD
  • Tracking Ransomware End to End

    Elie Bursztein, Luca Invernizzi, Kylie McRoberts
    Wed, 17:05 - 17:30
    Mandalay Bay EF
  • Protecting Pentests: Recommendations for Performing More Secure Tests

    Wesley McGrew
    Wed, 17:05 - 17:30
    Mandalay Bay GH
  • Zero Days Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits

    Lillian Ablon
    Wed, 17:05 - 17:30
    South Seas ABE
  • Garbage In Garbage Out: How Purportedly Great Machine Learning Models can be Screwed Up by Bad Data

    Hillary Sanders
    Wed, 17:05 - 17:30
    South Seas CDF
  • 18:30
  • Pwnie Awards

    Dino Dai Zovi
    Wed, 18:30 - 19:30
    Lagoon ABCGHI