Schedule
- 1.
- Elissa Shevinsky
- 2.
- Casey Smith
- 3.
- Kathy Liszka
- 4.
- Joshua Pitts
- 5.SEWiFi: Building a Security Enhanced WiFi Dongle
- Ryan Holeman
- 6.Betting BIOS Bugs Won't Bite Y'er Butt?
- Xeno Kovah
- Corey Kallenberg
- 1.
- Dominic Spill
- Michael Ossmann
- Jared Boone
- 2.
- David Schuetz
- 3.httpscreenshot - A Tool for Both Teams
- Steve Breen
- Justin Kennedy
- 4.Automated Binary Analysis with Pin and Python
- Omar Ahmed
- Tyler Bohan
- 5.NaCl: A New Crypto Library
- Daniel J. Bernstein
- Tanja Lange
- 6.
- Kristen K. Greene
- Joshua Franklin
- John Kelsey
- 7.0wn the Con
- The Shmoo Group
- 8.White is the New Black: Why White Data Really Matters
- Irena Damsky
- 9.
- Peter Schwabe
- 10.The Dark Art of Data Visualization
- David Pisano
- 2.Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass
- Jared DeMott
- 3.There's Waldo! Tracking Users via Mobile Apps
- Colby Moore
- Patrick Wardle
- 4.
- Terry Nelms
- 5.The Joy Of Intelligent Proactive Security
- Scott Behrens
- Andy Hoernecke
- 6.Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"
- Elvis Hovor
- Shimon Modi
- 7.The Windows Sandbox Paradox
- James Forshaw
- 8.No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap
- Andrew Morris
- 9.
- Anthony Kasza
- Dhia Mahjoub
- 1.Where the Wild Things Are: Encryption, Police Access & the User
- Whitney Merrill
- 2.
- Brandon Benson
- 3.Quantum Computing 01100101
- Tess Schrodinger
- 4.Come to the Dark Side--We Have (Misfortune) Cookies
- Lior Oppenheim
- Shahar Tal
- 5.
- Tom Cross
- David Raymond
- Gregory Conti
- 6.
- 7.Ask the EFF
- Kurt Opsahl
- Nate Cardozo
- 8.Crypto Without Computers
- Ben Agre
- 9.
- Chris Cullison
- Zack Allen
- Avi Rubin
- 10.
- Meltem Sˆnmez Turan
- John Kelsey
- Kerry McKay
Last modified 4yr ago