Star 0

Talks

Title Humans
Resistance is Futile: SDN Assimilating Our Networks
Political Pwnage: The Hacker’s Guide to Cybersecurity Policy Nick Leiserson
Where Do the Phishers Live? Collecting Phishers’ Geographic Locations from Automated Honeypots
Software Security by the Numbers
Exploiting Memory Corruption Vulnerabilities on the FreeRTOS Operating System Joel Sandin
Speak Security and Enter: Better Ways to Communicate with Non-Technical Users
Breaking Bulbs Briskly by Bogus Broadcasts
Reverse-Engineering Wireless SCADA Systems Karl Koscher
Opening Remarks, Rumblings, Ruminations and Rants The Shmoo Group
AVLeak: Turning Antivirus Emulators Inside Out
Closing Plenary: Information Security Programs in Academia Greg Conti , Matt Blaze
Static Malware and SMTP Mail Analysis using General Purpose Graphical Processing Units (GPGPU)
You Ain’t Seen Nothing Yet: New Paradigms for Policy, Regulation, and Community Engagement Jeff Moss , Mara Tam , Greg Conti , Vincenzo Iozzo
Attack on Titans: A Survey of New Attacks Against Big Data and Machine Learning Andrew Ruef
#thingswikfound #omarax: What is it, and why you may care?
LTE Security & Protocol Exploits
LostPass: Pixel-perfect LastPass Phishing
Using The Algebraic Eraser To Secure Low Power Devices
This Message Will Self-Destruct in 10 Seconds: Avoiding Bilateral Enucleation 3AlarmLampscooter
My Hash is My Passport: Understanding Web and Mobile Authentication David Schuetz
Penetration Testing Custom TLS Stacks
(P|G)Ohst Exploitation Carl Vincent
No Easy Breach: Challenges and Lessons Learned from an Epic Investigation
The Road to SYSTEM: Recycling Old Vulnerabilities for Unpatched Privilege Escalation and A New Network Attack Stephen Breen
Making Milware: An Interdisciplinary Tryst Trey Herr
Containing an Attack with Linux Containers and AppArmor/SELinux Jay Beale
Hacking The Wireless World — Software Defined Radio Exploits Balint Seeber
Keynote Address
0wn the Con The Shmoo Group
Ask the EFF Eva Galperin , Kurt Opsahl
Be Free, Little GuardBunny! Kristin Paget
Compressed Context Based Analytic Results for Use in Computer Vision System for Network Defense
Building an Encyclopedia of Malware Configs (to punch miscreants)
Hiding from the Investigator: Understanding OS X and iOS Code Signing to Hide Data Joshua Pitts
Users Are People Too: How to Make Your Tools Not Suck for Humans
Crypto and Quantum and Post Quantum Jean-Philippe Aumasson
OSX Vulnerability Research and Why We Wrote Our Own Debugger Tyler Bohan
Online, No One Knows You’re Dead
Gatekeeper Exposed Patrick Wardle