Schedule

ONE TRACK MIND

    1.
    Opening Remarks, Rumblings, Ruminations, and Rants
    2.
    U2F Zero: Secure Hardware Design, DIY Mass Production, and Amazon Prime
      Conor Patrick
    3.
    35 Years of Cyberwar: The Squirrels are Winning
      Space Rogue
    4.
    Implantable Logic Analyzers and Unlocking Doors
      Kenny McElroy
    5.
    Cyborg Self-Hacking: An Examination of Cochlear Implants
      Jeff Dodge
    6.
    Introducing Jak: Safely Share Sensitive Files via Git
      Chris DiLorenzo
    8.
    Keynote Seven Things: Frank Zappa, T. Coraghassen Boyle, and Twenty-one Years in Security
      Dr. Gary McGraw

BUILD IT!

    1.
    So You Want to Hack Radios
      Marc Newlin
      Matt Knight
    2.
    Exploring The Infrared World
      Dominic Spill
      Michael Ossmann
    5.
      Nicolas Kseib
      Shimon Modi
    6.
    0wn the Con
      The Shmoo Group
    7.
    8.
    ripr – Run Slices of Binary Code from Python
      Patrick Biernat
    9.
    Safety Bot Guaranteed
      Rich Seymour
    10.

BELAY IT!

    1.
    LangSec for Penetration Testing: How and Why
      Falcon Darkstar Momot
      Sergey Bratus
    2.
    Know Normal, Find Evil: Windows 10 Edition
      Jake Williams
    3.
    Who Wants to Allow Arbitrary Code Execution on Their Boxes? We Do It Every Day.
      Brian Redbeard
      Brad Ison
    4.
    Goodnight Moon & the House of Horrors: A look at the current IoT ecosystem and the regulations trying to control it
      Whitney Merrill
      Aaron Alva
    7.
    Anti-Ransomware: Turning the Tables
      Gal Shpantzer
      G. Mark Hardy
    10.
    Does a BEAR Leak in the Woods? The Democratic National Committee breach, Russian APTs, and the 2016 U.S. Election
      Toni Gidwani

BRING IT ON!

    1.
      Brian David Johnson
      Natalie Vanatta
    2.
    Ask the Feds
      Allan Friedman
      Nick Leiserson
      Eric Mill
      Jessica Wilkerson
    3.
    Ask the EFF: Protecting Tomorrow
      Kurt Opsahl
      Andrew Crocker
    4.
      Allison Miller
      Melissa Clarke
      Margaret Schedel
    5.
    Flailing is Learning: My First Year as a Malware Analyst
      Lauren Pearce
    6.
    The State of Secure Messaging
      Nikita Borisov
      Sze Chuen Tan
    7.
    The Metadata is the Message (and Sometimes the Message is the Metadata
      Matt Blaze
    8.
    A Nickel Tour of the Ad Fraud Ecosystem
      Ryan Castellucci
    9.
    The Threat Intel Results are in… You are NOT the hacker! : Disinformation Campaigns vs. Attribution Claims
      Mark Kuhr
    10.
    Challenges and Opportunities: Application Containers and Micro Services
      Anil Karmel
      Andrew Wild

CLOSING

    1.
    Designing and Executing the Worldís First All-Computer Hacking Competition: A panel with the development team
      Tim Vidas
      Chris Eagle
      Jason Wright
      Brian Caswell
      Mike Thompson
      Holt Sorenson