Schedule
ONE TRACK MIND
Five Not-Totally-Crazy Ways to Build for Usability
Elissa Shevinsky
Don't Look Now! Malicious Image Spam
Kathy Liszka
SEWiFi: Building a Security Enhanced WiFi Dongle
Ryan Holeman
Betting BIOS Bugs Won't Bite Y'er Butt?
Xeno Kovah
Corey Kallenberg
BUILD IT!
Dominic Spill
Michael Ossmann
Jared Boone
Knock Knock: A Survey of iOS Authentication Methods
David Schuetz
httpscreenshot - A Tool for Both Teams
Steve Breen
Justin Kennedy
Automated Binary Analysis with Pin and Python
Omar Ahmed
Tyler Bohan
NaCl: A New Crypto Library
Daniel J. Bernstein
Tanja Lange
Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry
Kristen K. Greene
Joshua Franklin
John Kelsey
0wn the Con
The Shmoo Group
White is the New Black: Why White Data Really Matters
Irena Damsky
Eliminating Timing Side-channels. A Tutorial
Peter Schwabe
The Dark Art of Data Visualization
David Pisano
BELAY IT!
Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass
Jared DeMott
There's Waldo! Tracking Users via Mobile Apps
Colby Moore
Patrick Wardle
The Joy Of Intelligent Proactive Security
Scott Behrens
Andy Hoernecke
Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"
Elvis Hovor
Shimon Modi
The Windows Sandbox Paradox
James Forshaw
No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap
Andrew Morris
Infrastructure Tracking with Passive Monitoring and Active Probing
Anthony Kasza
Dhia Mahjoub
BRING IT ON!
Where the Wild Things Are: Encryption, Police Access & the User
Whitney Merrill
Brandon Benson
Quantum Computing 01100101
Tess Schrodinger
Come to the Dark Side--We Have (Misfortune) Cookies
Lior Oppenheim
Shahar Tal
Deception for the Cyber Defender: To Err is Human; to Deceive, Divine
Tom Cross
David Raymond
Gregory Conti
Ask the EFF
Kurt Opsahl
Nate Cardozo
Crypto Without Computers
Ben Agre
Mascots, March Madness & #yogapants: Hacking Goes to College
Chris Cullison
Zack Allen
Avi Rubin
Meltem Sˆnmez Turan
John Kelsey
Kerry McKay
Last updated