Schedule
- 1.Opening Remarks, Rumblings, Ruminations, and Rants
- 2.
- Joseph Hall
- Ben Ramsey
- 3.Crypto and Quantum and Post Quantum
- Jean-Philippe Aumasson
- 4.#thingswikfound #omarax: What is it, and why you may care?
- Jaime Filson
- 5.Static Malware and SMTP Mail Analysis using General Purpose Graphical Processing Units (GPGPU)
- Rick Wesson
- 8.Keynote
- Neil Gershenfeld
- 1.
- Sean Cassidy
- 2.Hacking The Wireless World — Software Defined Radio Exploits
- Balint Seeber
- 3.
- Carl Vincent
- 5.0wn the Con
- The Shmoo Group
- 6.OSX Vulnerability Research and Why We Wrote Our Own Debugger
- Tyler Bohan
- Brandon Edwards
- 7.Penetration Testing Custom TLS Stacks
- Alex Moneger
- 8.
- Rob Weiss
- John Eberhardt
- 9.Be Free, Little GuardBunny!
- Kristin Paget
- 10.
- Karl Koscher
- 1.Users Are People Too: How to Make Your Tools Not Suck for Humans
- Gillian Andrews
- Sara Sinclair Brody
- 2.Software Security by the Numbers
- Chris Eng
- 3.Using the Algebraic Eraser to Secure Low-Power and Passive IoT Devices
- Derek Atkins
- 4.Speak Security and Enter: Better Ways to Communicate with Non-Technical Users
- Jessy Irwin
- 5.
- Alex Bulazel
- 6.No Easy Breach: Challenges and Lessons Learned from an Epic Investigation
- Matt Dunwoody
- Nick Carr
- 7.Attack on Titans: A Survey of New Attacks Against Big Data and Machine Learning
- Andrew Ruef
- Rock Stevens
- 8.Containing an Attack with Linux Containers and AppArmor/SELinux
- Jay Beale
- 9.My Hash is My Passport: Understanding Web and Mobile Authentication
- David Schuetz
- 10.Building an Encyclopedia of Malware Configs (to punch miscreants)
- Jon Bambenek
- 2.Online, No One Knows You’re Dead
- Andrew Kalat
- 3.You Ain’t Seen Nothing Yet: New Paradigms for Policy, Regulation, and Community Engagement
- Greg Conti (moderator)
- Mara Tam
- Vincenzo Iozzo
- Jeff Moss
- Randy Wheeler
- 4.Political Pwnage: The Hacker’s Guide to Cybersecurity Policy
- Nick Leiserson
- Jen Ellis
- 5.
- Roger Piqueras Jover
- 6.This Message Will Self-Destruct in 10 Seconds: Avoiding Bilateral Enucleation
- 3AlarmLampscooter
- 7.Ask the EFF
- Kurt Opsahl
- Andrew Crocker
- Bill Buddington
- Eva Galperin
- 8.
- Trey Herr
- Eric Armbrust
- 9.Resistance is Futile: SDN Assimilating Our Networks
- Sarah Rees
- Jonathan Medina
- 10.Gatekeeper Exposed
- Patrick Wardle
- 1.Information Security Programs in Academia
- Matt Blaze (moderator)
- Greg Conti
- Rick Forno
- Jeff Foster
Last modified 4yr ago