Schedule

ONE TRACK MIND

  1. CCTV: Setup, Attack Vectors, and Laws

    • Joshua Schroeder

    • Spencer Brooks

  2. The Dissipation of Hackers in the Enterprise

    • Weasel

  3. The Evolution of Linux Kernel Module Signing

    • Rebecca “.bx” Shapiro

  4. How Hackers for Charity (possibly) Saved me a LOT of Money

    • Branden Miller

    • Emily Miller

BUILD IT

  1. AV Evasion with the Veil Framework

    • Christopher Truncer

    • TheGrayhound

    • Michael Wright

  2. Controlling USB Flash Drive Controllers: Expose of Hidden Features

    • Richard Harman

  3. Genuinely “Trusted Computing”: Free and Open Hardware Security Modules

    • Ryan Lackey

  4. Introducing idb - Simplified Blackbox iOS App Pentesting

    • Daniel A. Mayer

  5. SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography

    • Daniel J. Bernstein

    • Tanja Lange

  6. unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback

    • Kang Li

    • Xiaoning Li

    • Lee Harrison

BELAY IT

  1. A Critical Review of Spatial Analysis

    • David Giametta

    • Andrew Potter

  2. Data Whales and Troll Tears: Beat the Odds in InfoSec

    • Davi Ottenheimer

    • Allison Miller

  3. Introducing DARPA’s Cyber Grand Challenge

    • Mike Walker

  4. Operationalizing Threat Information Sharing: Beyond Policies and Platitudes

    • Sean Barnum and Aharon Chernin

  5. Practical Applications of Data Science in Detection

    • Mike Sconzo

    • Brian Wylie

  6. Timing-Based Attestation: Sexy Defense, or the Sexiest

    • Xeno Kovah

    • Corey Kallenberg

    • John Butterworth

BRING IT ON

  1. Abusing ACPI Control Methods

    • Assambly

  2. LTE vs. Darwin

    • Hendrik Schmidt

    • Brian Butterly

  3. Malicious Online Activities Related to the 2012 U.S. General Election

    • Joshua Franklin

    • Robert Tarlecki

    • Matthew Jablonski

  4. The NSA: Capabilities and Countermeasures

    • Bruce Schneier

  5. Syncing Mentorship Between Winners And Beginners

    • Tarah Wheeler Van Vlack

    • Liz Dahlstrom

  6. Vehicle Forensics - The Data Beyond the Dashboard

    • Courtney Lancaster

  7. You Don’t Have the Evidence

    • Scott Moulton

Last updated