• 10:00
  • The Background Noise of the Internet

    Andrew Morris
    Sat, 10:00 - 10:50
    Far Room - Belay It
  • IoT RCE, a Study With Disney

    Lilith Wyatt
    Sat, 10:00 - 10:50
    Main Room - Bring It On
  • Opening Closed Systems with GlitchKit

    Dominic Spill, Kate Temkin
    Sat, 10:00 - 10:50
    Near Room - Build It
  • 11:00
  • Profiling and Detecting all Things SSL with JA3

    John B. Althouse, Jeff Atkinson
    Sat, 11:00 - 11:50
    Far Room - Belay It
  • Pages from a Sword-Maker’s Notebook pt. II

    Vyrus
    Sat, 11:00 - 11:50
    Main Room - Bring It On
  • When CAN CANT

    Tim Brom, Mitchell Johnson
    Sat, 11:00 - 11:50
    Near Room - Build It
  • 12:00
  • Nation-State Espionage: Hunting Multi-Platform APTs on a Global Scale

    Michael Flossman, Eva Galperin, Cooper Quintin
    Sat, 12:00 - 12:50
    Far Room - Belay It
  • Building Absurd Christmas Light Shows

    Rob Joyce
    Sat, 12:00 - 12:50
    Main Room - Bring It On
  • Building a GoodWatch

    Travis Goodspeed
    Sat, 12:00 - 12:50
    Near Room - Build It
  • 14:00
  • Catch Me If You Can: A Decade of Evasive Malware Attack and Defense

    Alex Bulazel, Bülent Yener
    Sat, 14:00 - 14:50
    Far Room - Belay It
  • Electronic Voting in 2018: Threat or Menace

    Matt Blaze, Joseph Lorenzo Hall, Harri Hursti, Margaret MacAlpine
    Sat, 14:00 - 14:50
    Main Room - Bring It On
  • ODA: A Collaborative, Open Source Reversing Platform in the Cloud

    Bill Davis, Anthony DeRosa
    Sat, 14:00 - 14:50
    Near Room - Build It
  • 15:00
  • Someone is Lying to You on the Internet: Using Analytics to Find Bot Submissions in the FCC Net Neutrality Submissions

    Leah Figueroa
    Sat, 15:00 - 15:20
    Far Room - Belay It
  • A Social Science Approach to Cybersecurity Education for all Disciplines

    Aunshul Rege
    Sat, 15:00 - 15:20
    Main Room - Bring It On
  • Better Git Hacking: Extracting “Deleted” Secrets from Git Databases with Grawler

    Justin Regele
    Sat, 15:00 - 15:20
    Near Room - Build It
  • 15:30
  • Bludgeoning Bootloader Bugs: No Write Left Behind

    Rebecca Shapiro
    Sat, 15:30 - 15:50
    Far Room - Belay It
  • Listing the 1337: Adventures in Curating HackerTwitter’s Institutional Knowledge

    Daniel Gallagher, hex waxwing
    Sat, 15:30 - 15:50
    Main Room - Bring It On
  • CertGraph: A Tool to Crawl the Graph of SSL Certificate Alternate Names using Certificate Transparency

    Ian Foster
    Sat, 15:30 - 15:50
    Near Room - Build It
  • 16:00
  • AWS Honey Tokens with SPACECRAB

    Dan Bourke
    Sat, 16:00 - 16:20
    Far Room - Belay It
  • Cyberlaw: Year in Review

    Steve Black
    Sat, 16:00 - 16:20
    Main Room - Bring It On
  • afl-unicorn: Fuzzing the ‘Unfuzzable’

    Nathan Voss
    Sat, 16:00 - 16:20
    Near Room - Build It
  • 16:30
  • Time Signature Based Matching for Data Fusion and Coordination Detection in Cyber Relevant Logs

    Lauren Deason
    Sat, 16:30 - 16:50
    Far Room - Belay It
  • Skill Building By Revisiting Past CVEs

    Sandra Escandor-O’Keefe
    Sat, 16:30 - 16:50
    Main Room - Bring It On
  • radare2 in Conversation

    Rich Seymour
    Sat, 16:30 - 16:50
    Near Room - Build It
  • 17:00
  • Defending Against Robot Attacks

    Brittany Postnikoff
    Sat, 17:00 - 17:50
    Far Room - Belay It
  • Hacking the News: an Infosec Guide to the Media, and How to Talk to Them

    Sean Gallagher, Steve Ragan, Paul Wagenseil
    Sat, 17:00 - 17:50
    Main Room - Bring It On
  • OK Google, Tell Me About Myself

    Lisa Chang
    Sat, 17:00 - 17:50
    Near Room - Build It
  • 21:00
  • Saturday Night Party

     
    Sat, 21:00 - 23:59
    Main Room