Schedule
Last updated
Last updated
Rob Fuller
Joshua Schroeder
Spencer Brooks
The Dissipation of Hackers in the Enterprise
Weasel
The Evolution of Linux Kernel Module Signing
Rebecca “.bx” Shapiro
How Hackers for Charity (possibly) Saved me a LOT of Money
Branden Miller
Emily Miller
Aaron Gee-Clough
Jake Williams
Alissa Torres
Dominic Spill
Christopher Truncer
TheGrayhound
Michael Wright
Controlling USB Flash Drive Controllers: Expose of Hidden Features
Richard Harman
Genuinely “Trusted Computing”: Free and Open Hardware Security Modules
Ryan Lackey
Introducing idb - Simplified Blackbox iOS App Pentesting
Daniel A. Mayer
Jaime Sanchez
Pablo San Emeterio
SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography
Daniel J. Bernstein
Tanja Lange
unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback
Kang Li
Xiaoning Li
Lee Harrison
David Giametta
Andrew Potter
Data Whales and Troll Tears: Beat the Odds in InfoSec
Davi Ottenheimer
Allison Miller
Benjamin Gatti
Introducing DARPA’s Cyber Grand Challenge
Mike Walker
Operationalizing Threat Information Sharing: Beyond Policies and Platitudes
Sean Barnum and Aharon Chernin
Practical Applications of Data Science in Detection
Mike Sconzo
Brian Wylie
Aaron Beuhring
Kyle Salous
Paulo Shakarian
Timing-Based Attestation: Sexy Defense, or the Sexiest
Xeno Kovah
Corey Kallenberg
John Butterworth
Dominic Spill
Michael Ossmann
Abusing ACPI Control Methods
Assambly
Lee Harrison
Kang Li
Josh “m0nk” Thomas
LTE vs. Darwin
Hendrik Schmidt
Brian Butterly
Malicious Online Activities Related to the 2012 U.S. General Election
Joshua Franklin
Robert Tarlecki
Matthew Jablonski
The NSA: Capabilities and Countermeasures
Bruce Schneier
Tarah Wheeler Van Vlack
Liz Dahlstrom
Shannon Brown
Vehicle Forensics - The Data Beyond the Dashboard
Courtney Lancaster
You Don’t Have the Evidence
Scott Moulton