• 09:00
  • The Future of ApplePwn - How to Save Your Money

    Timur Yunusov
    Thu, 09:00 - 09:25
    Jasmine Ballroom
  • Skype & Type: Keystroke Leakage over VoIP

    Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik
    Thu, 09:00 - 09:25
    Lagoon ABCGHI
  • The Industrial Revolution of Lateral Movement

    Tal Be'ery, Tal Maor
    Thu, 09:00 - 09:25
    Lagoon DEFJKL
  • Influencing the Market to Improve Security

    Justine Bone, Chris Wysopal
    Thu, 09:00 - 09:25
    Mandalay Bay AB
  • OpenCrypto: Unchaining the JavaCard Ecosystem

    Dan Cvrcek, George Danezis, Vasilios Mavroudis, Petr Svenda
    Thu, 09:00 - 09:25
    Mandalay Bay CD
  • The Shadow Brokers – Cyber Fear Game-Changers

    Matthieu Suiche
    Thu, 09:00 - 09:25
    Mandalay Bay EF
  • Bot vs. Bot for Evading Machine Learning Malware Detection

    Hyrum Anderson
    Thu, 09:00 - 09:25
    Mandalay Bay GH
  • Escalating Insider Threats Using VMware's API

    Ofri Ziv
    Thu, 09:00 - 09:25
    South Seas ABE
  • The Epocholypse 2038: What's in Store for the Next 20 Years

    Mikko Hypponen
    Thu, 09:00 - 09:25
    South Seas CDF
  • 09:45
  • Sonic Gun to Smart Devices: Your Devices Lose Control Under Ultrasound/Sound

    Wang Kang, Shangyuan LI, Aimin Pan, Zhengbo Wang, Bo Yang
    Thu, 09:45 - 10:35
    Jasmine Ballroom
  • Advanced Pre-Breach Planning: Utilizing a Purple Team to Measure Effectiveness vs. Maturity

    Justin Harvey
    Thu, 09:45 - 10:35
    Lagoon ABCGHI
  • Fad or Future? Getting Past the Bug Bounty Hype

    Angelo Prado, Kymberlee Price, Charles Valentine
    Thu, 09:45 - 10:35
    Lagoon DEFJKL
  • Redesigning PKI to Solve Revocation Expiration and Rotation Problems

    Brian Knopf
    Thu, 09:45 - 10:35
    Mandalay Bay AB
  • rVMI: A New Paradigm for Full System Analysis

    Jonas Pfoh, Sebastian Vogl
    Thu, 09:45 - 10:35
    Mandalay Bay CD
  • Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets

    Nitay Artenstein
    Thu, 09:45 - 10:35
    Mandalay Bay EF
  • 'Ghost Telephonist' Link Hijack Exploitations in 4G LTE CS Fallback

    Lin Huang, Jun Li, Haoqi Shan, Qing Yang, Yuwei Zheng
    Thu, 09:45 - 10:35
    Mandalay Bay GH
  • Evading Microsoft ATA for Active Directory Domination

    Nikhil Mittal
    Thu, 09:45 - 10:35
    South Seas ABE
  • Datacenter Orchestration Security and Insecurity: Assessing Kubernetes Mesos and Docker at Scale

    Dino Dai Zovi
    Thu, 09:45 - 10:35
    South Seas CDF
  • 11:00
  • Bug Collisions Meet Government Vulnerability Disclosure

    Lillian Ablon, Jason Healey, Trey Herr, Katie Moussouris, Kim Zetter
    Thu, 11:00 - 11:50
    Jasmine Ballroom
  • Hunting GPS Jammers

    Vlad Gostomelsky
    Thu, 11:00 - 11:50
    Lagoon ABCGHI
  • Practical Tips for Defending Web Applications in the Age of DevOps

    Zane Lackey
    Thu, 11:00 - 11:50
    Lagoon DEFJKL
  • Breaking the Laws of Robotics: Attacking Industrial Robots

    Federico Maggi, Marcello Pogliani, Mario Polino, Davide Quarta, Andrea Maria Zanchettin, Stefano Zanero
    Thu, 11:00 - 11:50
    Mandalay Bay AB
  • Intel SGX Remote Attestation is Not Sufficient

    Yogesh Swami
    Thu, 11:00 - 11:50
    Mandalay Bay CD
  • Infecting the Enterprise: Abusing Office365+Powershell for Covert C2

    Craig Dods
    Thu, 11:00 - 11:50
    Mandalay Bay EF
  • Why Most Cyber Security Training Fails and What We Can Do About it

    Arun Vishwanath
    Thu, 11:00 - 11:50
    Mandalay Bay GH
  • Go to Hunt Then Sleep

    Daniele Bianco, Robert M. Lee
    Thu, 11:00 - 11:50
    South Seas ABE
  • Don't Trust the DOM: Bypassing XSS Mitigations via Script Gadgets

    Krzysztof Kotowicz, Sebastian Lekies, Eduardo Vela
    Thu, 11:00 - 11:50
    South Seas CDF
  • 12:10
  • Exploitation of Kernel Pool Overflow on Microsoft Windows 10 DKOM/DKOHM is Back in DKOOHM! Direct Kernel Optional Object Header Manipulation

    Nikita Tarakanov
    Thu, 12:10 - 13:00
    Jasmine Ballroom
  • Game of Chromes: Owning the Web with Zombie Chrome Extensions

    Tomer Cohen
    Thu, 12:10 - 13:00
    Lagoon ABCGHI
  • Honey I Shrunk the Attack Surface – Adventures in Android Security Hardening

    Nick Kralevich
    Thu, 12:10 - 13:00
    Lagoon DEFJKL
  • Quantifying Risk in Consumer Software at Scale - Consumer Reports' Digital Standard

    Eason Goodale, Sarah Zatko
    Thu, 12:10 - 13:00
    Mandalay Bay AB
  • kR\^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse

    Marios Pomonis
    Thu, 12:10 - 13:00
    Mandalay Bay CD
  • AVPASS: Leaking and Bypassing Antivirus Detection Model Automatically

    Chanil Jeon, Jinho Jung, Taesoo Kim, Max Wolotsky, Insu Yun
    Thu, 12:10 - 13:00
    Mandalay Bay EF
  • Cyber Wargaming: Lessons Learned in Influencing Security Stakeholders Inside and Outside Your Organization

    Jason Nichols
    Thu, 12:10 - 13:00
    Mandalay Bay GH
  • Free-Fall: Hacking Tesla from Wireless to CAN Bus

    Yuefeng Du, Ling Liu, Sen Nie
    Thu, 12:10 - 13:00
    South Seas ABE
  • Attacking Encrypted USB Keys the Hard(ware) Way

    Rémi Audebert, Elie Bursztein, Jean-Michel Picod
    Thu, 12:10 - 13:00
    South Seas CDF
  • 14:30
  • Taking Over the World Through MQTT - Aftermath

    Lucas Lundgren
    Thu, 14:30 - 15:20
    Jasmine Ballroom
  • Evolutionary Kernel Fuzzing

    Richard Johnson
    Thu, 14:30 - 15:20
    Lagoon ABCGHI
  • Firmware is the New Black - Analyzing Past Three Years of BIOS/UEFI Security Vulnerabilities

    Rodrigo Rubira Branco, Bruce Monroe, Vincent Zimmer
    Thu, 14:30 - 15:20
    Lagoon DEFJKL
  • The Origin of Array \[@@species\]: How Standards Drive Bugs in Script Engines

    Natalie Silvanovich
    Thu, 14:30 - 15:20
    Mandalay Bay AB
  • Evil Bubbles or How to Deliver Attack Payload via the Physics of the Process

    Marina Krotofil
    Thu, 14:30 - 15:20
    Mandalay Bay CD
  • Friday the 13th: JSON Attacks

    Oleksandr Mirosh, Alvaro Muñoz
    Thu, 14:30 - 15:20
    Mandalay Bay EF
  • Automated Detection of Vulnerabilities in Black-Box Routers (and Other Network Devices)

    Gabi Nakibly
    Thu, 14:30 - 15:20
    Mandalay Bay GH
  • Exploit Kit Cornucopia

    Brad Antoniewicz, Matt Foley
    Thu, 14:30 - 15:20
    South Seas ABE
  • Defeating Samsung KNOX with Zero Privilege

    Di Shen
    Thu, 14:30 - 15:20
    South Seas CDF
  • 15:50
  • Electronegativity - A Study of Electron Security

    Luca Carettoni
    Thu, 15:50 - 16:40
    Jasmine Ballroom
  • WiFuzz: Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake

    Mathy Vanhoef
    Thu, 15:50 - 16:40
    Lagoon ABCGHI
  • Well that Escalated Quickly! How Abusing Docker API Led to Remote Code Execution Same Origin Bypass and Persistence in the Hypervisor via Shadow Containers

    Michael Cherny, Sagie Dulce
    Thu, 15:50 - 16:40
    Lagoon DEFJKL
  • Intel AMT Stealth Breakthrough

    Alexander Ermolov, Dmitriy Evdokimov, Maksim Malyutin
    Thu, 15:50 - 16:40
    Mandalay Bay AB
  • Blue Pill for Your Phone

    Oleksandr Bazhaniuk, Yuriy Bulygin
    Thu, 15:50 - 16:40
    Mandalay Bay CD
  • Exploiting Network Printers

    Jens Müller
    Thu, 15:50 - 16:40
    Mandalay Bay EF
  • Lies and Damn Lies: Getting Past the Hype of Endpoint Security Solutions

    Lidia Giuliano, Mike Spaulding
    Thu, 15:50 - 16:40
    Mandalay Bay GH
  • And Then the Script-Kiddie Said Let There be No Light. Are Cyber-Attacks on the Power Grid Limited to Nation-State Actors?

    Anastasis Keliris, Charalambos Konstantinou, Mihalis Maniatakos
    Thu, 15:50 - 16:40
    South Seas ABE
  • Digital Vengeance: Exploiting the Most Notorious C&C Toolkits

    Waylon Grange
    Thu, 15:50 - 16:40
    South Seas CDF
  • 17:00
  • Revoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using Science

    Daniel Bohannon, Lee Holmes
    Thu, 17:00 - 18:00
    Jasmine Ballroom
  • IoTCandyJar: Towards an Intelligent-Interaction Honeypot for IoT Devices

    Xing Jin, Tongbo Luo, Xin Ouyang, Zhaoyan Xu
    Thu, 17:00 - 18:00
    Lagoon ABCGHI
  • Cloak & Dagger: From Two Permissions to Complete Control of the UI Feedback Loop

    Simon Pak Ho Chung, Yanick Fratantonio, Wenke Lee, Chenxiong Qian
    Thu, 17:00 - 18:00
    Lagoon DEFJKL
  • Dealing the Perfect Hand - Shuffling Memory Blocks on z/OS

    Ayoub EL AASSAL
    Thu, 17:00 - 18:00
    Mandalay Bay AB
  • RBN Reloaded - Amplifying Signals from the Underground

    Dhia Mahjoub, Jason Passwaters, David Rodriguez
    Thu, 17:00 - 17:25
    Mandalay Bay CD
  • Breaking the x86 Instruction Set

    Christopher Domas
    Thu, 17:00 - 18:00
    Mandalay Bay EF
  • A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!

    Orange Tsai
    Thu, 17:00 - 18:00
    Mandalay Bay GH
  • Betraying the BIOS: Where the Guardians of the BIOS are Failing

    Alexander Matrosov
    Thu, 17:00 - 18:00
    South Seas ABE
  • The Adventures of AV and the Leaky Sandbox

    Amit Klein, Itzik Kotler
    Thu, 17:00 - 18:00
    South Seas CDF