Schedule
Last updated
Last updated
Opening Remarks, Rumblings, Ruminations, and Rants
U2F Zero: Secure Hardware Design, DIY Mass Production, and Amazon Prime
Conor Patrick
35 Years of Cyberwar: The Squirrels are Winning
Space Rogue
Implantable Logic Analyzers and Unlocking Doors
Kenny McElroy
Cyborg Self-Hacking: An Examination of Cochlear Implants
Jeff Dodge
Introducing Jak: Safely Share Sensitive Files via Git
Chris DiLorenzo
Tommy Chin
Peter Muller
Keynote Seven Things: Frank Zappa, T. Coraghassen Boyle, and Twenty-one Years in Security
Dr. Gary McGraw
So You Want to Hack Radios
Marc Newlin
Matt Knight
Exploring The Infrared World
Dominic Spill
Michael Ossmann
David Wu
Sergey Bratus
Paul Clark
Nicolas Kseib
Shimon Modi
0wn the Con
The Shmoo Group
Andrew White
Jesse Kriss
ripr – Run Slices of Binary Code from Python
Patrick Biernat
Safety Bot Guaranteed
Rich Seymour
Sebastian Verschoor
LangSec for Penetration Testing: How and Why
Falcon Darkstar Momot
Sergey Bratus
Know Normal, Find Evil: Windows 10 Edition
Jake Williams
Who Wants to Allow Arbitrary Code Execution on Their Boxes? We Do It Every Day.
Brian Redbeard
Brad Ison
Goodnight Moon & the House of Horrors: A look at the current IoT ecosystem and the regulations trying to control it
Whitney Merrill
Aaron Alva
Rebekah Houser
Alexander Chailytko
Stanislav Skuratovich
Anti-Ransomware: Turning the Tables
Gal Shpantzer
G. Mark Hardy
Brandon Creighton
Brian Cardinale
Does a BEAR Leak in the Woods? The Democratic National Committee breach, Russian APTs, and the 2016 U.S. Election
Toni Gidwani
Brian David Johnson
Natalie Vanatta
Ask the Feds
Allan Friedman
Nick Leiserson
Eric Mill
Jessica Wilkerson
Ask the EFF: Protecting Tomorrow
Kurt Opsahl
Andrew Crocker
Allison Miller
Melissa Clarke
Margaret Schedel
Flailing is Learning: My First Year as a Malware Analyst
Lauren Pearce
The State of Secure Messaging
Nikita Borisov
Sze Chuen Tan
The Metadata is the Message (and Sometimes the Message is the Metadata
Matt Blaze
A Nickel Tour of the Ad Fraud Ecosystem
Ryan Castellucci
The Threat Intel Results are in… You are NOT the hacker! : Disinformation Campaigns vs. Attribution Claims
Mark Kuhr
Challenges and Opportunities: Application Containers and Micro Services
Anil Karmel
Andrew Wild
Designing and Executing the Worldís First All-Computer Hacking Competition: A panel with the development team
Tim Vidas
Chris Eagle
Jason Wright
Brian Caswell
Mike Thompson
Holt Sorenson