Resistance is Futile: SDN Assimilating Our Networks
|
|
Political Pwnage: The Hacker’s Guide to Cybersecurity Policy
|
Nick Leiserson
|
Where Do the Phishers Live? Collecting Phishers’ Geographic Locations from Automated Honeypots
|
|
Software Security by the Numbers
|
|
Exploiting Memory Corruption Vulnerabilities on the FreeRTOS Operating System
|
Joel Sandin
|
Speak Security and Enter: Better Ways to Communicate with Non-Technical Users
|
|
Breaking Bulbs Briskly by Bogus Broadcasts
|
|
Reverse-Engineering Wireless SCADA Systems
|
Karl Koscher
|
Opening Remarks, Rumblings, Ruminations and Rants
|
The Shmoo Group
|
AVLeak: Turning Antivirus Emulators Inside Out
|
|
Closing Plenary: Information Security Programs in Academia
|
Greg Conti
,
Matt Blaze
|
Static Malware and SMTP Mail Analysis using General Purpose Graphical Processing Units (GPGPU)
|
|
You Ain’t Seen Nothing Yet: New Paradigms for Policy, Regulation, and Community Engagement
|
Jeff Moss
,
Mara Tam
,
Greg Conti
,
Vincenzo Iozzo
|
Attack on Titans: A Survey of New Attacks Against Big Data and Machine Learning
|
Andrew Ruef
|
#thingswikfound #omarax: What is it, and why you may care?
|
|
LTE Security & Protocol Exploits
|
|
LostPass: Pixel-perfect LastPass Phishing
|
|
Using The Algebraic Eraser To Secure Low Power Devices
|
|
This Message Will Self-Destruct in 10 Seconds: Avoiding Bilateral Enucleation
|
3AlarmLampscooter
|
My Hash is My Passport: Understanding Web and Mobile Authentication
|
David Schuetz
|
Penetration Testing Custom TLS Stacks
|
|
(P|G)Ohst Exploitation
|
Carl Vincent
|
No Easy Breach: Challenges and Lessons Learned from an Epic Investigation
|
|
The Road to SYSTEM: Recycling Old Vulnerabilities for Unpatched Privilege Escalation and A New Network Attack
|
Stephen Breen
|
Making Milware: An Interdisciplinary Tryst
|
Trey Herr
|
Containing an Attack with Linux Containers and AppArmor/SELinux
|
Jay Beale
|
Hacking The Wireless World — Software Defined Radio Exploits
|
Balint Seeber
|
Keynote Address
|
|
0wn the Con
|
The Shmoo Group
|
Ask the EFF
|
Eva Galperin
,
Kurt Opsahl
|
Be Free, Little GuardBunny!
|
Kristin Paget
|
Compressed Context Based Analytic Results for Use in Computer Vision System for Network Defense
|
|
Building an Encyclopedia of Malware Configs (to punch miscreants)
|
|
Hiding from the Investigator: Understanding OS X and iOS Code Signing to Hide Data
|
Joshua Pitts
|
Users Are People Too: How to Make Your Tools Not Suck for Humans
|
|
Crypto and Quantum and Post Quantum
|
Jean-Philippe Aumasson
|
OSX Vulnerability Research and Why We Wrote Our Own Debugger
|
Tyler Bohan
|
Online, No One Knows You’re Dead
|
|
Gatekeeper Exposed
|
Patrick Wardle
|