Schedule

ONE TRACK MIND

  1. 1.
    Opening Remarks, Rumblings, Ruminations, and Rants
  2. 2.
  3. 3.
    Crypto and Quantum and Post Quantum
    • Jean-Philippe Aumasson
  4. 4.
    #thingswikfound #omarax: What is it, and why you may care?
    • Jaime Filson
  5. 5.
    Static Malware and SMTP Mail Analysis using General Purpose Graphical Processing Units (GPGPU)
    • Rick Wesson
  6. 8.
    Keynote
    • Neil Gershenfeld

BUILD IT!

  1. 2.
    Hacking The Wireless World — Software Defined Radio Exploits
    • Balint Seeber
  2. 3.
    • Carl Vincent
  3. 5.
    0wn the Con
    • The Shmoo Group
  4. 6.
    OSX Vulnerability Research and Why We Wrote Our Own Debugger
    • Tyler Bohan
    • Brandon Edwards
  5. 7.
    Penetration Testing Custom TLS Stacks
    • Alex Moneger
  6. 9.
    Be Free, Little GuardBunny!
    • Kristin Paget

BELAY IT!

  1. 1.
    Users Are People Too: How to Make Your Tools Not Suck for Humans
    • Gillian Andrews
    • Sara Sinclair Brody
  2. 2.
    Software Security by the Numbers
    • Chris Eng
  3. 3.
    Using the Algebraic Eraser to Secure Low-Power and Passive IoT Devices
    • Derek Atkins
  4. 4.
    Speak Security and Enter: Better Ways to Communicate with Non-Technical Users
    • Jessy Irwin
  5. 6.
    No Easy Breach: Challenges and Lessons Learned from an Epic Investigation
    • Matt Dunwoody
    • Nick Carr
  6. 7.
    Attack on Titans: A Survey of New Attacks Against Big Data and Machine Learning
    • Andrew Ruef
    • Rock Stevens
  7. 8.
    Containing an Attack with Linux Containers and AppArmor/SELinux
    • Jay Beale
  8. 9.
    My Hash is My Passport: Understanding Web and Mobile Authentication
    • David Schuetz
  9. 10.
    Building an Encyclopedia of Malware Configs (to punch miscreants)
    • Jon Bambenek

BRING IT ON!

  1. 2.
    Online, No One Knows You’re Dead
    • Andrew Kalat
  2. 3.
    You Ain’t Seen Nothing Yet: New Paradigms for Policy, Regulation, and Community Engagement
    • Greg Conti (moderator)
    • Mara Tam
    • Vincenzo Iozzo
    • Jeff Moss
    • Randy Wheeler
  3. 4.
    Political Pwnage: The Hacker’s Guide to Cybersecurity Policy
    • Nick Leiserson
    • Jen Ellis
  4. 5.
    • Roger Piqueras Jover
  5. 6.
    This Message Will Self-Destruct in 10 Seconds: Avoiding Bilateral Enucleation
    • 3AlarmLampscooter
  6. 7.
    Ask the EFF
    • Kurt Opsahl
    • Andrew Crocker
    • Bill Buddington
    • Eva Galperin
  7. 8.
    • Trey Herr
    • Eric Armbrust
  8. 9.
    Resistance is Futile: SDN Assimilating Our Networks
    • Sarah Rees
    • Jonathan Medina
  9. 10.
    Gatekeeper Exposed
    • Patrick Wardle

CLOSING

  1. 1.
    Information Security Programs in Academia
    • Matt Blaze (moderator)
    • Greg Conti
    • Rick Forno
    • Jeff Foster
Last modified 3yr ago