Schedule
ONE TRACK MIND
CCTV: Setup, Attack Vectors, and Laws
Joshua Schroeder
Spencer Brooks
The Dissipation of Hackers in the Enterprise
Weasel
The Evolution of Linux Kernel Module Signing
Rebecca “.bx” Shapiro
How Hackers for Charity (possibly) Saved me a LOT of Money
Branden Miller
Emily Miller
Security Analytics: Less Hype, More Data
Aaron Gee-Clough
BUILD IT
ADD – Complicating Memory Forensics Through Memory Disarray
Jake Williams
Alissa Torres
An Open and Affordable USB Man in the Middle Device
Dominic Spill
AV Evasion with the Veil Framework
Christopher Truncer
TheGrayhound
Michael Wright
Controlling USB Flash Drive Controllers: Expose of Hidden Features
Richard Harman
Genuinely “Trusted Computing”: Free and Open Hardware Security Modules
Ryan Lackey
Introducing idb - Simplified Blackbox iOS App Pentesting
Daniel A. Mayer
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instant Messaging Platforms
Jaime Sanchez
Pablo San Emeterio
SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography
Daniel J. Bernstein
Tanja Lange
unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback
Kang Li
Xiaoning Li
Lee Harrison
BELAY IT
A Critical Review of Spatial Analysis
David Giametta
Andrew Potter
Data Whales and Troll Tears: Beat the Odds in InfoSec
Davi Ottenheimer
Allison Miller
Introducing DARPA’s Cyber Grand Challenge
Mike Walker
Operationalizing Threat Information Sharing: Beyond Policies and Platitudes
Sean Barnum and Aharon Chernin
Practical Applications of Data Science in Detection
Mike Sconzo
Brian Wylie
Raising Costs for your Attackers Instead of your CFO
Aaron Beuhring
Kyle Salous
Timing-Based Attestation: Sexy Defense, or the Sexiest
Xeno Kovah
Corey Kallenberg
John Butterworth
Unambiguous Encapsulation - Separating Data and Signaling
Dominic Spill
Michael Ossmann
BRING IT ON
Abusing ACPI Control Methods
Assambly
Arms Race: The Story of (In)-Secure Bootloaders
Lee Harrison
Kang Li
How to Train your Snapdragon: Exploring Power Frameworks on Android
Josh “m0nk” Thomas
LTE vs. Darwin
Hendrik Schmidt
Brian Butterly
Malicious Online Activities Related to the 2012 U.S. General Election
Joshua Franklin
Robert Tarlecki
Matthew Jablonski
The NSA: Capabilities and Countermeasures
Bruce Schneier
Syncing Mentorship Between Winners And Beginners
Tarah Wheeler Van Vlack
Liz Dahlstrom
Technology Law Issues for Security Professionals
Shannon Brown
Vehicle Forensics - The Data Beyond the Dashboard
Courtney Lancaster
You Don’t Have the Evidence
Scott Moulton
Last updated