Schedule

ONE TRACK MIND

    5.
    SEWiFi: Building a Security Enhanced WiFi Dongle
      Ryan Holeman
    6.
    Betting BIOS Bugs Won't Bite Y'er Butt?
      Xeno Kovah
      Corey Kallenberg

BUILD IT!

    1.
      Dominic Spill
      Michael Ossmann
      Jared Boone
    3.
    httpscreenshot - A Tool for Both Teams
      Steve Breen
      Justin Kennedy
    4.
    Automated Binary Analysis with Pin and Python
      Omar Ahmed
      Tyler Bohan
    5.
    NaCl: A New Crypto Library
      Daniel J. Bernstein
      Tanja Lange
    6.
      Kristen K. Greene
      Joshua Franklin
      John Kelsey
    7.
    0wn the Con
      The Shmoo Group
    8.
    White is the New Black: Why White Data Really Matters
      Irena Damsky
    10.
    The Dark Art of Data Visualization
      David Pisano

BELAY IT!

    2.
    Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass
      Jared DeMott
    3.
    There's Waldo! Tracking Users via Mobile Apps
      Colby Moore
      Patrick Wardle
    5.
    The Joy Of Intelligent Proactive Security
      Scott Behrens
      Andy Hoernecke
    6.
    Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"
      Elvis Hovor
      Shimon Modi
    7.
    The Windows Sandbox Paradox
      James Forshaw
    8.
    No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap
      Andrew Morris

BRING IT ON!

    1.
    Where the Wild Things Are: Encryption, Police Access & the User
      Whitney Merrill
    2.
      Brandon Benson
    3.
    Quantum Computing 01100101
      Tess Schrodinger
    4.
    Come to the Dark Side--We Have (Misfortune) Cookies
      Lior Oppenheim
      Shahar Tal
    7.
    Ask the EFF
      Kurt Opsahl
      Nate Cardozo
    8.
    Crypto Without Computers
      Ben Agre
    9.
    10.
      Meltem Sˆnmez Turan
      John Kelsey
      Kerry McKay