• 10:00
  • Writing a Fuzzer for Any Language with American Fuzzy Lop

    Ariel Zelivansky
    Sat, 10:00 - 10:50
    Build It Room - Build It
  • The Beginner’s Guide to the Musical Scales of Cyberwar

    Jessica Malekos Smith
    Sat, 10:00 - 10:50
    Main Room - Bring It On
  • High Confidence Malware Attribution using the Rich Header

    Kevin Bilzer, Seamus Burke, RJ Joyce
    Sat, 10:00 - 10:50
    Belay It room - Belay It
  • 11:00
  • CryptoLocker Deep-Dive: Tracking security threats on the Bitcoin public ledger

    Nicolas Kseib, Olivia Thet
    Sat, 11:00 - 11:50
    Build It Room - Build It
  • The APT at Home: The attacker that knows your mother’s maiden name

    Chris Cox
    Sat, 11:00 - 11:50
    Main Room - Bring It On
  • BECs and Beyond: Investigating and Defending Office 365

    Doug Bienstock
    Sat, 11:00 - 11:50
    Belay It room - Belay It
  • 12:00
  • Process Control Through Counterfeit Comms: Using and Abusing Built-In Functionality to Own a PLC

    Jared Rittle
    Sat, 12:00 - 12:50
    Build It Room - Build It
  • Firemen vs. Safety Matches: How the current skills pipeline is wrong

    Amélie E. Koran
    Sat, 12:00 - 12:50
    Main Room - Bring It On
  • Five-sigma Network Events (and how to find them)

    John O’Neil
    Sat, 12:00 - 12:50
    Belay It room - Belay It
  • 14:00
  • Be an IoT Safety Hero: Policing Unsafe IoT through the Consumer Product Safety Commission

    Elliot Kaye, Andrea Matwyshyn
    Sat, 14:00 - 14:50
    Build It Room - Build It
  • Ground Truth: 18 vendors, 6000 firmware images, 2.7 million binaries, and a flaw in the Linux/MIPS stack

    Tim Carstens, Mudge, Parker Thompson
    Sat, 14:00 - 14:50
    Main Room - Bring It On
  • Electronic Voting in 2018: Bad or Worse?

    Matt Blaze
    Sat, 14:00 - 14:50
    Belay It room - Belay It
  • 15:00
  • Trip Wire(less)

    Omaha
    Sat, 15:00 - 15:20
    Build It Room - Build It
  • Advancing a Scientific Approach to Security Tool Evaluations with MITRE ATT&CK™

    Francis Duff
    Sat, 15:00 - 15:20
    Main Room - Bring It On
  • Analyzing Shodan Images With Optical Character Recognition

    Michael Portera
    Sat, 15:00 - 15:20
    Belay It room - Belay It
  • 15:30
  • Social Network Analysis: A scary primer

    Phil Vachon, Andrew Wong
    Sat, 15:30 - 15:50
    Build It Room - Build It
  • Mentoring the Intelligent Deviant: What the special operations and infosec communities can learn from each other

    Paul Brister, Nina Kollars
    Sat, 15:30 - 15:50
    Main Room - Bring It On
  • Security Response Survival Skills

    Ben Ridgway
    Sat, 15:30 - 15:50
    Belay It room - Belay It
  • 16:00
  • Three Ways DuckDuckGo Protects User Privacy While Getting Things Done (and how you can too)

    Marc Soda
    Sat, 16:00 - 16:20
    Build It Room - Build It
  • A Little Birdy Told Me About Your Warrants

    Avi Zajac
    Sat, 16:00 - 16:20
    Main Room - Bring It On
  • iPhone Surgery for the Practically Paranoid

    Rudy Cuevas, Evan Jensen
    Sat, 16:00 - 16:20
    Belay It room - Belay It
  • 16:30
  • Post-quantum Crypto: Today’s defense against tomorrow’s quantum hacker

    Christian Paquin
    Sat, 16:30 - 16:50
    Build It Room - Build It
  • A Tisket, a Tasket, a Dark Web Shopping Basket

    Anne Addison Meriwether, Emma Zaballos
    Sat, 16:30 - 16:50
    Main Room - Bring It On
  • A Code Pirate’s Cutlass: Recovering Software Architecture from Embedded Binaries

    evm
    Sat, 16:30 - 16:50
    Belay It room - Belay It
  • 17:00
  • 24/7 CTI: Operationalizing Cyber Threat Intelligence

    Xena Olsen
    Sat, 17:00 - 17:50
    Build It Room - Build It
  • Behind Enemy Lines: Inside the operations of a nation state’s cyber program

    Andrew Blaich, Michael Flossman
    Sat, 17:00 - 17:50
    Main Room - Bring It On
  • 0wn the Con

    The Shmoo Group
    Sat, 17:00 - 17:50
    Belay It room - Belay It