• 09:00
  • Stop that Release There's a Vulnerability!

    Christine Gadsby
    Thu, 09:00 - 09:25
    Islander EI
  • Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines

    Carsten Schuermann
    Thu, 09:00 - 09:25
    Islander FG
  • The Problems and Promise of WebAssembly

    Natalie Silvanovich
    Thu, 09:00 - 09:25
    Jasmine Ballroom
  • ARTist - A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware

    Oliver Schranz
    Thu, 09:00 - 09:25
    Lagoon GHI
  • Real Eyes Realize Real Lies: Beating Deception Technologies

    Matan Hart
    Thu, 09:00 - 09:25
    Lagoon JKL
  • Two-Factor Authentication Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key

    L Jean Camp, Sanchari Das, Gianpaolo Russo
    Thu, 09:00 - 09:25
    South Pacific F
  • Demystifying PTSD in the Cybersecurity Environment

    Joe Slowik
    Thu, 09:00 - 09:25
    South Seas ABE
  • Fire & Ice: Making and Breaking macOS Firewalls

    Patrick Wardle
    Thu, 09:00 - 09:25
    South Seas CDF
  • Money-rity Report: Using Intelligence to Predict the Next Payment Card Fraud Victims

    Clare Gollnick, Cathal Smyth
    Thu, 09:00 - 09:25
    Tradewinds EF
  • 09:45
  • Black Box is Dead. Long Live Black Box!

    Vladimir Kononovich, Aleksei Stennikov
    Thu, 09:45 - 10:35
    Islander EI
  • The Science of Hiring and Retaining Female Cybersecurity Engineers

    Ashley Holtz
    Thu, 09:45 - 10:35
    Islander FG
  • New Norms and Policies in Cyber-Diplomacy

    James Andrew Lewis, Jane Holl Lute, Jeff Moss, Christopher Painter
    Thu, 09:45 - 10:35
    Jasmine Ballroom
  • Your Voice is My Passport

    Azeem Aqil, John Seymour
    Thu, 09:45 - 10:35
    Lagoon GHI
  • Snooping on Cellular Gateways and Their Critical Role in ICS

    Justin Shattuck
    Thu, 09:45 - 10:35
    Lagoon JKL
  • Identity Theft: Attacks on SSO Systems

    Kelby Ludwig
    Thu, 09:45 - 10:35
    South Pacific F
  • Kernel Mode Threats and Practical Defenses

    Joe Desimone, Gabriel Landau
    Thu, 09:45 - 10:35
    South Seas ABE
  • The Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet

    Alex Ionescu, Gabrielle Viala
    Thu, 09:45 - 10:35
    South Seas CDF
  • Reconstruct the World from Vanished Shadow: Recovering Deleted VSS Snapshots

    Minoru Kobayashi, Hiroshi Suzuki
    Thu, 09:45 - 10:35
    Tradewinds EF
  • 11:00
  • Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform Capabilities

    Brad Geesaman
    Thu, 11:00 - 11:50
    Islander EI
  • Decompiler Internals: Microcode

    Ilfak Guilfanov
    Thu, 11:00 - 11:50
    Islander FG
  • Stealth Mango and the Prevalence of Mobile Surveillanceware

    Andrew Blaich, Michael Flossman
    Thu, 11:00 - 11:50
    Jasmine Ballroom
  • A Deep Dive into macOS MDM (and How it can be Compromised)

    Max Bélanger, Jesse Endahl
    Thu, 11:00 - 11:50
    Lagoon GHI
  • Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels

    Christian Dresen, Jens Müller
    Thu, 11:00 - 11:50
    Lagoon JKL
  • GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs

    Christopher Domas
    Thu, 11:00 - 11:50
    South Pacific F
  • AI & ML in Cyber Security - Why Algorithms are Dangerous

    Raffael Marty
    Thu, 11:00 - 11:50
    South Seas ABE
  • Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies

    Alejandro Hernandez
    Thu, 11:00 - 11:50
    South Seas CDF
  • Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives

    Maxwell Bland, Christian Dameff, Jeff Tully
    Thu, 11:00 - 11:50
    Tradewinds EF
  • 12:10
  • Outsmarting the Smart City

    Dan Crowley, Mauro Paredes, Jennifer Savage
    Thu, 12:10 - 13:00
    Islander EI
  • WebAssembly: A New World of Native Exploits on the Browser

    Justin Engler, Tyler Lukasiewicz
    Thu, 12:10 - 13:00
    Islander FG
  • Playback: A TLS 1.3 Story

    Alfonso Garcia Alguacil, Alejo Murillo Moya
    Thu, 12:10 - 13:00
    Jasmine Ballroom
  • TLBleed: When Protecting Your CPU Caches is Not Enough

    Ben Gras
    Thu, 12:10 - 13:00
    Lagoon GHI
  • Wrangling with the Ghost: An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities

    Christopher Ertl, Anders Fogh, Matt Miller
    Thu, 12:10 - 13:00
    Lagoon JKL
  • So I became a Domain Controller

    Benjamin Delpy, Vincent Le Toux
    Thu, 12:10 - 13:00
    South Pacific F
  • Applied Self-Driving Car Security

    Charlie Miller, Christopher Valasek
    Thu, 12:10 - 13:00
    South Seas ABE
  • Protecting the Protector Hardening Machine Learning Defenses Against Adversarial Attacks

    Jugal Parikh, Holly Stewart, Randy Treit
    Thu, 12:10 - 13:00
    South Seas CDF
  • None of My Pixel is Your Business: Active Watermarking Cancellation Against Video Streaming Service

    Yi Qun Hui, Wang Kang
    Thu, 12:10 - 13:00
    Tradewinds EF
  • 14:30
  • Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator

    Alex Bulazel
    Thu, 14:30 - 15:20
    Islander EI
  • From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities

    Jimmy Su, Wei Wu, Xinyu Xing
    Thu, 14:30 - 15:20
    Islander FG
  • Automated Discovery of Deserialization Gadget Chains

    Ian Haken
    Thu, 14:30 - 15:20
    Jasmine Ballroom
  • Another Flip in the Row

    Daniel Gruss, Moritz Lipp, Michael Schwarz
    Thu, 14:30 - 15:20
    Lagoon GHI
  • Legal Liability for IOT Cybersecurity Vulnerabilities

    Ijay Palansky
    Thu, 14:30 - 15:20
    Lagoon JKL
  • Catch me Yes we can! – Pwning Social Engineers using Natural Language Processing Techniques in Real-Time

    Marcel Carlsson, Ian Harris
    Thu, 14:30 - 15:20
    South Pacific F
  • Exploitation of a Modern Smartphone Baseband

    Marco Grassi, Muqing Liu, Tianyi Xie
    Thu, 14:30 - 15:20
    South Seas ABE
  • Last Call for SATCOM Security

    Ruben Santamarta
    Thu, 14:30 - 15:20
    South Seas CDF
  • How can Someone with Autism Specifically Enhance the Cyber Security Workforce?

    Rhett Greenhagen, Casey Hurt, Stacy Thayer
    Thu, 14:30 - 15:20
    Tradewinds EF
  • 15:50
  • For the Love of Money: Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems

    Leigh Anne Galloway, Timur Yunusov
    Thu, 15:50 - 16:40
    Islander EI
  • SDL That Won't Break the Bank

    Steve Lipner
    Thu, 15:50 - 16:40
    Islander FG
  • Mainframe \[z/OS\] Reverse Engineering and Exploit Development

    Chad Rikansrud
    Thu, 15:50 - 16:40
    Jasmine Ballroom
  • Hardening Hyper-V through Offensive Security Research

    Jordan Rabet
    Thu, 15:50 - 16:40
    Lagoon GHI
  • Lowering the Bar: Deep Learning for Side Channel Analysis

    Baris Ege, Jasper Van Woudenberg
    Thu, 15:50 - 16:40
    Lagoon JKL
  • IoT Malware: Comprehensive Survey Analysis Framework and Case Studies

    Andrei Costin, Jonas Zaddach
    Thu, 15:50 - 16:40
    South Pacific F
  • Understanding and Exploiting Implanted Medical Devices

    Jonathan Butts, Billy Rios
    Thu, 15:50 - 16:40
    South Seas ABE
  • Practical Web Cache Poisoning: Redefining 'Unexploitable'

    James Kettle
    Thu, 15:50 - 16:40
    South Seas CDF
  • SirenJack: Cracking a 'Secure' Emergency Warning Siren System

    Balint Seeber
    Thu, 15:50 - 16:40
    Tradewinds EF
  • 17:00
  • The Finest Penetration Testing Framework for Software-Defined Networks

    Jinwoo Kim, Seungsoo Lee, Seungwon Shin, Seungwon Woo
    Thu, 17:00 - 17:50
    Islander EI
  • Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina

    Dominik Maier, Bhargava Shastry, Vincent Ulitzsch
    Thu, 17:00 - 17:50
    Islander FG
  • Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library

    Maddie Stone
    Thu, 17:00 - 17:50
    Jasmine Ballroom
  • Lessons and Lulz: The 4th Annual Black Hat USA NOC Report

    Bart Stump, Neil Wyler
    Thu, 17:00 - 17:50
    Lagoon GHI
  • It's a PHP Unserialization Vulnerability Jim but Not as We Know It

    Sam Thomas
    Thu, 17:00 - 17:50
    Lagoon JKL
  • An Attacker Looks at Docker: Approaching Multi-Container Applications

    Wesley Mcgrew
    Thu, 17:00 - 17:50
    South Pacific F
  • DeepLocker - Concealing Targeted Attacks with AI Locksmithing

    Jiyong Jang, Dhilung Kirat, Marc Ph Stoecklin
    Thu, 17:00 - 17:50
    South Seas ABE
  • Over-the-Air: How we Remotely Compromised the Gateway BCM and Autopilot ECUs of Tesla Cars

    Yuefeng Du, Ling Liu, Sen Nie, Wenkai Zhang
    Thu, 17:00 - 17:50
    South Seas CDF
  • Return of Bleichenbacher's Oracle Threat (ROBOT)

    Hanno Böck, Craig Young
    Thu, 17:00 - 17:50
    Tradewinds EF