Schedule
Last updated
Last updated
Elissa Shevinsky
Casey Smith
Kathy Liszka
Joshua Pitts
SEWiFi: Building a Security Enhanced WiFi Dongle
Ryan Holeman
Betting BIOS Bugs Won't Bite Y'er Butt?
Xeno Kovah
Corey Kallenberg
Dominic Spill
Michael Ossmann
Jared Boone
David Schuetz
httpscreenshot - A Tool for Both Teams
Steve Breen
Justin Kennedy
Automated Binary Analysis with Pin and Python
Omar Ahmed
Tyler Bohan
NaCl: A New Crypto Library
Daniel J. Bernstein
Tanja Lange
Kristen K. Greene
Joshua Franklin
John Kelsey
0wn the Con
The Shmoo Group
White is the New Black: Why White Data Really Matters
Irena Damsky
Peter Schwabe
The Dark Art of Data Visualization
David Pisano
David Dorsey
Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass
Jared DeMott
There's Waldo! Tracking Users via Mobile Apps
Colby Moore
Patrick Wardle
Terry Nelms
The Joy Of Intelligent Proactive Security
Scott Behrens
Andy Hoernecke
Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"
Elvis Hovor
Shimon Modi
The Windows Sandbox Paradox
James Forshaw
No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap
Andrew Morris
Anthony Kasza
Dhia Mahjoub
Loc Nguyen
Where the Wild Things Are: Encryption, Police Access & the User
Whitney Merrill
Brandon Benson
Quantum Computing 01100101
Tess Schrodinger
Come to the Dark Side--We Have (Misfortune) Cookies
Lior Oppenheim
Shahar Tal
Tom Cross
David Raymond
Gregory Conti
Sarah Zatko
Ask the EFF
Kurt Opsahl
Nate Cardozo
Crypto Without Computers
Ben Agre
Chris Cullison
Zack Allen
Avi Rubin
Meltem Sˆnmez Turan
John Kelsey
Kerry McKay