Schedule
ONE TRACK MIND
Opening Remarks, Rumblings, Ruminations, and Rants
U2F Zero: Secure Hardware Design, DIY Mass Production, and Amazon Prime
Conor Patrick
35 Years of Cyberwar: The Squirrels are Winning
Space Rogue
Implantable Logic Analyzers and Unlocking Doors
Kenny McElroy
Cyborg Self-Hacking: An Examination of Cochlear Implants
Jeff Dodge
Introducing Jak: Safely Share Sensitive Files via Git
Chris DiLorenzo
Can a Drunk Person Authenticate Using Brainwaves? #NotAlcoholicsJustResearchers
Tommy Chin
Peter Muller
Keynote Seven Things: Frank Zappa, T. Coraghassen Boyle, and Twenty-one Years in Security
Dr. Gary McGraw
BUILD IT!
So You Want to Hack Radios
Marc Newlin
Matt Knight
Exploring The Infrared World
Dominic Spill
Michael Ossmann
A Context-Aware Kernel IPC Firewall for Android
David Wu
Sergey Bratus
I Have a Graph Database. Now What?
Nicolas Kseib
Shimon Modi
0wn the Con
The Shmoo Group
User Focused Security at Netflix: Stethoscope
Andrew White
Jesse Kriss
ripr – Run Slices of Binary Code from Python
Patrick Biernat
Safety Bot Guaranteed
Rich Seymour
(In-)secure messaging with SCIMP and OMEMO
Sebastian Verschoor
BELAY IT!
LangSec for Penetration Testing: How and Why
Falcon Darkstar Momot
Sergey Bratus
Know Normal, Find Evil: Windows 10 Edition
Jake Williams
Who Wants to Allow Arbitrary Code Execution on Their Boxes? We Do It Every Day.
Brian Redbeard
Brad Ison
Goodnight Moon & the House of Horrors: A look at the current IoT ecosystem and the regulations trying to control it
Whitney Merrill
Aaron Alva
Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment
Alexander Chailytko
Stanislav Skuratovich
Anti-Ransomware: Turning the Tables
Gal Shpantzer
G. Mark Hardy
Dig Out Your Brick Phone! Bringing AMPS Back with GNU Radio
Brandon Creighton
Excuse me, Server, Do You Have the Time?
Brian Cardinale
Does a BEAR Leak in the Woods? The Democratic National Committee breach, Russian APTs, and the 2016 U.S. Election
Toni Gidwani
BRING IT ON!
A Widening Attack Plain: Threatcasting Tomorrow’s Threats
Brian David Johnson
Natalie Vanatta
Ask the Feds
Allan Friedman
Nick Leiserson
Eric Mill
Jessica Wilkerson
Ask the EFF: Protecting Tomorrow
Kurt Opsahl
Andrew Crocker
háček: Computing a Hacker Experience
Allison Miller
Melissa Clarke
Margaret Schedel
Flailing is Learning: My First Year as a Malware Analyst
Lauren Pearce
The State of Secure Messaging
Nikita Borisov
Sze Chuen Tan
The Metadata is the Message (and Sometimes the Message is the Metadata
Matt Blaze
A Nickel Tour of the Ad Fraud Ecosystem
Ryan Castellucci
The Threat Intel Results are in… You are NOT the hacker! : Disinformation Campaigns vs. Attribution Claims
Mark Kuhr
Challenges and Opportunities: Application Containers and Micro Services
Anil Karmel
Andrew Wild
CLOSING
Designing and Executing the Worldís First All-Computer Hacking Competition: A panel with the development team
Tim Vidas
Chris Eagle
Jason Wright
Brian Caswell
Mike Thompson
Holt Sorenson
Last updated