• 09:00
  • Optimistic Dissatisfaction with the Status Quo: Steps We Must Take to Improve Security in Complex Landscapes

    Parisa Tabriz
    Wed, 09:00 - 09:50
    Mandalay Bay Events Center
  • 10:30
  • Holding on for Tonight: Addiction in InfoSec

    Jamie Tomasello
    Wed, 10:30 - 10:55
    Islander EI
  • Dissecting Non-Malicious Artifacts: One IP at a Time

    Dani Goland, Ido Naor
    Wed, 10:30 - 10:55
    Islander FG
  • Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking

    Louis Dion Marcil
    Wed, 10:30 - 10:55
    Jasmine Ballroom
  • Measuring the Speed of the Red Queen's Race; Adaption and Evasion in Malware

    Felipe Ducau, Richard Harang
    Wed, 10:30 - 10:55
    Lagoon GHI
  • Exposing the Bait: A Qualitative Look at the Impact of Autonomous Peer Communication to Enhance Organizational Phishing Detection

    Kingkane Malmquist
    Wed, 10:30 - 10:55
    Lagoon JKL
  • Detecting Credential Compromise in AWS

    William Bengtson
    Wed, 10:30 - 10:55
    South Pacific F
  • Software Attacks on Hardware Wallets

    Sergei Volokitin
    Wed, 10:30 - 10:55
    South Seas ABE
  • Finding Xori: Malware Analysis Triage with Automated Disassembly

    Amanda Rousseau, Rich Seymour
    Wed, 10:30 - 10:55
    South Seas CDF
  • How I Learned to Stop Worrying and Love the SBOM

    Allan Friedman
    Wed, 10:30 - 10:55
    Tradewinds EF
  • 11:15
  • Stress and Hacking: Understanding Cognitive Stress in Tactical Cyber Ops

    Josiah Dykstra, Celeste Paul
    Wed, 11:15 - 12:05
    Islander EI
  • New Trends in Browser Exploitation: Attacking Client-Side JIT Compilers

    Samuel Groß
    Wed, 11:15 - 12:05
    Islander FG
  • KeenLab iOS Jailbreak Internals: Userland Read-Only Memory can be Dangerous

    Liang Chen
    Wed, 11:15 - 12:05
    Jasmine Ballroom
  • Miasm: Reverse Engineering Framework

    Fabrice Desclaux, Camille Mougey
    Wed, 11:15 - 12:05
    Lagoon GHI
  • From Bot to Robot: How Abilities and Law Change with Physicality

    Wendy Knox Everette, Brittany Postnikoff, Sara Jayne Terp
    Wed, 11:15 - 12:05
    Lagoon JKL
  • A Dive in to Hyper-V Architecture & Vulnerabilities

    Joe Bialek, Nicolas Joly
    Wed, 11:15 - 12:05
    South Pacific F
  • Deep Neural Networks for Hackers: Methods Applications and Open Source Tools

    Joshua Saxe
    Wed, 11:15 - 12:05
    South Seas ABE
  • Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths

    Jay Little
    Wed, 11:15 - 12:05
    South Seas CDF
  • TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems Forever

    Andrea Carcano, Younes Dragoni, Marina Krotofil
    Wed, 11:15 - 12:05
    Tradewinds EF
  • 13:30
  • Legal Landmines: How Law and Policy are Rapidly Shaping Information Security

    Leonard Bailey, Allison Bender, Amit Elazari, Jennifer Granick, Joseph Menn, Paul Rosen
    Wed, 13:30 - 14:20
    Islander EI
  • There will be Glitches: Extracting and Analyzing Automotive Firmware Efficiently

    Alyssa Milburn, Santiago Cordoba Pellicer, Niek Timmers, Ramiro Pareja Veredas, Nils Wiersma, Marc Witteman
    Wed, 13:30 - 14:20
    Islander FG
  • No Royal Road … Notes on Dangerous Game

    Mara Tam
    Wed, 13:30 - 14:20
    Jasmine Ballroom
  • Compression Oracle Attacks on VPN Networks

    Ahamed Nafeez
    Wed, 13:30 - 14:20
    Lagoon GHI
  • Reversing a Japanese Wireless SD Card - From Zero to Code Execution

    Guillaume Valadon
    Wed, 13:30 - 14:20
    Lagoon JKL
  • Remotely Attacking System Firmware

    Oleksandr Bazhaniuk, Jesse Michael, Mickey Shkatov
    Wed, 13:30 - 14:20
    South Pacific F
  • Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers

    Giovanni Camurati, Aurélien Francillon, Tom Hayes, Marius Muench, Sebastian Poeplau
    Wed, 13:30 - 14:20
    South Seas ABE
  • Deep Dive into an ICS Firewall Looking for the Fire Hole

    Benoit Camredon, Julien Lenoir
    Wed, 13:30 - 14:20
    South Seas CDF
  • Too Soft\[ware Defined\] Networks: SD-WAN Vulnerability Assessment

    Sergey Gordeychik, Aleksandr Timorin
    Wed, 13:30 - 14:20
    Tradewinds EF
  • 14:40
  • Threat Modeling in 2018: Attacks Impacts and Other Updates

    Adam Shostack
    Wed, 14:40 - 15:30
    Islander EI
  • Mental Health Hacks: Fighting Burnout Depression and Suicide in the Hacker Community

    Christian Dameff, Jerome Radcliffe
    Wed, 14:40 - 15:30
    Islander FG
  • Don't @ Me: Hunting Twitter Bots at Scale

    Olabode Anise, Jordan Wright
    Wed, 14:40 - 15:30
    Jasmine Ballroom
  • WireGuard: Next Generation Secure Network Tunnel

    Jason Donenfeld
    Wed, 14:40 - 15:30
    Lagoon GHI
  • Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology

    Lee Christensen, Matthew Graeber
    Wed, 14:40 - 15:30
    Lagoon JKL
  • Meltdown: Basics Details Consequences

    Daniel Gruss, Moritz Lipp, Michael Schwarz
    Wed, 14:40 - 15:30
    South Pacific F
  • From Workstation to Domain Admin: Why Secure Administration isn't Secure and How to Fix it

    Sean Metcalf
    Wed, 14:40 - 15:30
    South Seas ABE
  • Every ROSE has its Thorn: The Dark Art of Remote Online Social Engineering

    Matt Wixey
    Wed, 14:40 - 15:30
    South Seas CDF
  • The Unbearable Lightness of BMC's

    Matias Sebastian Soler, Nicolas Waisman
    Wed, 14:40 - 15:30
    Tradewinds EF
  • 16:00
  • Open Sesame: Picking Locks with Cortana

    Tal Be'ery, Ron Marcovich, Yuval Ron, Amichai Shulman
    Wed, 16:00 - 16:50
    Islander EI
  • LTE Network Automation Under Threat

    Ravishankar Borgaonkar, Altaf Shaik
    Wed, 16:00 - 16:50
    Islander FG
  • Why so Spurious? How a Highly Error-Prone x86/x64 CPU Feature can be Abused to Achieve Local Privilege Escalation on Many Operating Systems

    Nemanja Mulasmajic, Nicolas Peterson
    Wed, 16:00 - 16:50
    Jasmine Ballroom
  • A Brief History of Mitigation: The Path to EL1 in iOS 11

    Ian Beer
    Wed, 16:00 - 16:50
    Lagoon GHI
  • Breaking Parser Logic: Take Your Path Normalization off and Pop 0days Out!

    Orange Tsai
    Wed, 16:00 - 16:50
    Lagoon JKL
  • Behind the Speculative Curtain: The True Story of Fighting Meltdown and Spectre

    Eric Doerr, Matt Linton, Art Manion, Chris Robinson
    Wed, 16:00 - 16:50
    South Pacific F
  • Breaking the IIoT: Hacking industrial Control Gateways

    Thomas Roth
    Wed, 16:00 - 16:50
    South Seas ABE
  • ZEROing Trust: Do Zero Trust Approaches Deliver Real Security?

    David Weston
    Wed, 16:00 - 16:50
    South Seas CDF
  • Squeezing a Key through a Carry Bit

    Filippo Valsorda
    Wed, 16:00 - 16:50
    Tradewinds EF
  • 17:05
  • InfoSec Philosophies for the Corrupt Economy

    Lawrence Munro
    Wed, 17:05 - 17:30
    Islander EI
  • A Tangled Curl: Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme

    Ethan Heilman, Neha Narula
    Wed, 17:05 - 17:30
    Islander FG
  • AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries

    Kang Li
    Wed, 17:05 - 17:30
    Jasmine Ballroom
  • I for One Welcome Our New Power Analysis Overlords

    Colin O'flynn
    Wed, 17:05 - 17:30
    Lagoon GHI
  • Back to the Future: A Radical Insecure Design of KVM on ARM

    Rahul Kashyap, Baibhav Singh
    Wed, 17:05 - 17:30
    Lagoon JKL
  • The Air-Gap Jumpers

    Mordechai Guri
    Wed, 17:05 - 17:30
    South Pacific F
  • Is the Mafia Taking Over Cybercrime?

    Jonathan Lusthaus
    Wed, 17:05 - 17:30
    South Seas ABE
  • Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure

    Kevin Perlow
    Wed, 17:05 - 17:30
    South Seas CDF
  • How can Communities Move Forward After Incidents of Sexual Harassment or Assault?

    Makenzie Peterson
    Wed, 17:05 - 17:30
    Tradewinds EF