Star 0

Talks

Title Humans
Abuse of CPE Devices and Recommended Fixes Jonathan Spring , Paul Vixie , Chris Hallenbeck , Carnegie Mellon University , Farsight Security, Inc. , US-CERT
Threat Intelligence Library - A New Revolutionary Technology to Enhance the SOC Battle Rhythm! Ryan Trost
Defeating the Transparency Feature of DBI Kang Li , Xiaoning Li , University of Georgia
SAP, Credit Cards, and the Bird that Talks Too Much Ertunga Arsal , ESNC
Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani
Unveiling the Open Source Visualization Engine for Busy Hackers Thibault Reuille , Andrew Hay , OpenDNS , OpenDNS, Inc.
Multipath TCP: Breaking Today's Networks with Tomorrow's Protocols Catherine Pearce , Patrick Thomas , Neohapsis
Digging for IE11 Sandbox Escapes James Forshaw , Context Information Security Ltd.
The Library of Sparta David Raymond , Greg Conti , Tom Cross , USMA , West Point , Lancope
What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Botnet C&C; Panels! Aditya K Sood , Niara, Inc.
CloudBots: Harvesting Crypto Coins Like a Botnet Farmer Rob Ragan , Oscar Salazar , Bishop Fox
Protecting Data In-Use from Firmware and Physical Attacks Steve Weis , PrivateCore
Internet Scanning - Current State and Lessons Learned Mark Schloesser , Rapid7
Exploiting Unpatched iOS Vulnerabilities for Fun and Profit Yeongjin Jang , Tielei Wang , Byoungyoung Lee , Billy Lau , Georgia Institute of Technology
Network Attached Shell: N.A.S.ty Systems that Store Network Accessible Shells Jacob Holcomb , Independent Security Evaluators
How Smartcard Payment Systems Fail Ross Anderson , Cambridge University
Badger - The Networked Security State Estimation Toolkit Edmond Rogers , William Rogers , Gabe Weaver , University of Illinois , University of Illinois at Urbana-Champaign
I Know Your Filtering Policy Better than You Do: External Enumeration and Exploitation of Email and Web Security Solutions Ben Williams , NCC Group
ICSCorsair: How I Will PWN Your ERP Through 4-20 mA Current Loop Alexander Bolshev , Gleb Cherbov , Digital Security
Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware Christopher Kruegel , Lastline, Inc.
802.1x and Beyond! Brad Antoniewicz , Foundstone
Governments As Malware Authors: The Next Generation Mikko Hypponen , F-Secure
Reverse Engineering Flash Memory for Fun and Benefit Jeong Wook Oh , HP
Attacking Mobile Broadband Modems Like a Criminal Would Andreas Lindh , I Secure Sweden AB
Call To Arms: A Tale of the Weaknesses of Current Client-Side XSS Filtering Martin Johns , Ben Stock , Sebastian Lekies , SAP AG , University Erlangen-Nuremberg
SATCOM Terminals: Hacking by Air, Sea, and Land Ruben Santamarta , IOActive, Inc.
Android FakeID Vulnerability Walkthrough Jeff Forristal , Bluebox Security
Contemporary Automatic Program Analysis Julian Cohen
Point of Sale System Architecture and Security Lucas Zaichkowsky , AccessData
The New Scourge of Ransomware: A Study of CryptoLocker and Its Friends Lance James , John Bambenek , Deloitte & Touche LLP , Bambenek Consulting
Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways Brian Gorenc , Jasiel Spelman , Zero Day Initiative, HP Security Research
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring Alex Pinto , MLSec Project
How to Leak a 100-Million-Node Social Graph in Just One Week? - A Reflection on Oauth and API Design in Online Social Networks Pili Hu , Wing Cheong Lau , The Chinese University of Hong Kong
Why Control System Cyber-Security Sucks... Dr. Stefan Lders , CERN
Creating a Spider Goat: Using Transactional Memory Support for Security Igor Muttik , Alex Nayshtut , McAfee / Intel , Intel Corporation
When the Lights Go Out: Hacking Cisco EnergyWise Matthias Luft , Ayhan Soner Koca , ERNW GmbH
A Survey of Remote Automotive Attack Surfaces Charlie Miller , Christopher Valasek , IOActive, Inc.
Write Once, Pwn Anywhere Yang Yu , Tencent, Inc.
It Just (Net)works: The Truth About iOS 7's Multipeer Connectivity Framework Alban Diquet , Data Theorem
Windows Kernel Graphics Driver Attack Surface Ilja van Sprundel , IOActive, Inc.
Stay Out of the Kitchen: A DLP Security Bake-Off Zach Lanier , Kelly Lum , Duo Security
GRR: Find All the Badness, Collect All the Things Greg Castle , Google Inc.
Mobile Device Mismanagement Stephen Breen , NTT Com Security
Lifecycle of a Phone Fraudster: Exposing Fraud Activity from Reconnaissance to Takeover Using Graph Analysis and Acoustical Anomalies Vijay Balasubramaniyan , Raj Bandyopadhyay , Telvis Calhoun , Pindrop Security
Unwrapping the Truth: Analysis of Mobile Application Wrapping Solutions Ron Gutierrez , Stephen Komal , Gotham Digital Science
Pivoting in Amazon Clouds Andres Riancho
Mission mPOSsible Nils , Jon Butler , MWR InfoSecurity
OpenStack Cloud at Yahoo Scale: How to Avoid Disaster Anders Beitnes , Yahoo!
Reverse-Engineering the Supra iBox: Exploitation of a Hardened MSP430-Based Device Braden Thomas , Accuvant
Dynamic Flash Instrumentation for Fun and Profit Timo Hirvonen , F-Secure
Cybersecurity as Realpolitik Dan Geer , In-Q-Tel
48 Dirty Little Secrets Cryptographers Don't Want You To Know Thomas Ptacek , Alex Balducci , Matasano Security
Probabilistic Spying on Encrypted Tunnels Brandon Niemczyk , Prasad Rao , HP , HP, Security and Cloud Laboratories
APT Attribution and DNS Profiling Frankie Li , VXRL Research
Cellular Exploitation on a Global Scale: The Rise and Fall of the Control Protocol Mathew Solnik , Marc Blanchou , Accuvant LABS
Learn How to Control Every Room at a Luxury Hotel Remotely: The Dangers of Insecure Home Automation Deployment Jesus Molina , Nomeames Group
MoRE Shadow Walker: The Progression of TLB-Splitting on x86 Jacob Torrey , Assured Information Security
Pulling Back the Curtain on Airport Security: Can a Weapon Get Past TSA? Billy Rios , Qualys
Breaking the Security of Physical Devices Silvio Cesare , Qualys
Bitcoin Transaction Malleability Theory in Practice Daniel Chechik , Ben Hayak , Trustwave
SecSi Product Development: Techniques for Ensuring Secure Silicon Applied to Open-Source Verilog Projects Joseph FitzPatrick , SecuringHardware.com
Miniaturization Jason Larsen , IOActive, Inc.
The New Page of Injections Book: Memcached Injections Ivan Novikov , Wallarm
Computrace Backdoor Revisited Vitaliy Kamluk , Sergey Belov , Anibal Sacco , Kaspersky Lab , Cubica Labs
Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces Collin Mulliner , Northeastern University
Saving Cyberspace Jason Healey , Atlantic Council
Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs Tao Wei , Yulong Zhang , FireEye, Inc.
Exposing Bootkits with BIOS Emulation Lars Haukli , Blue Coat Systems
Smart Nest Thermostat: A Smart Spy in Your Home Yier Jin , Grant Hernandez , Daniel Buentello , University of Central Florida , Mioty
One Packer to Rule Them All: Empirical Identification, Comparison, and Circumvention of Current Antivirus Detection Techniques Alaeddine Mesbahi , Arne Swinnen , Verizon , NVISO
The State of Incident Response Bruce Schneier , Co3 Systems, Inc.
Leviathan: Command and Control Communications on Planet Earth Kenneth Geers , Kevin Thompson , FireEye, Inc.
A Scalable, Ensemble Approach for Building and Visualizing Deep Code-Sharing Networks Over Millions of Malicious Binaries Joshua Saxe , Invincea Labs
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques Daniel Lehmann , Ahmad-Reza Sadeghi , Technische Universitt Darmstadt , Technische Universitt Darmstadt & Intel CRI-SC
Understanding TOCTTOU in the Windows Kernel Font Scaler Engine Yu Wang , Qihoo 360
Understanding IMSI Privacy Ravishankar Borgaonkar , Swapnil Udar , TU Berlin , Aalto University
Capstone: Next Generation Disassembly Framework Coseinc , Nguyen Anh Quynh
Bringing Software Defined Radio to the Penetration Testing Community Jean-Michel Picod , Jonathan-Christofer Demay , Arnaud Lebrun , AIRBUS Defence and Space CyberSecurity
Time Trial: Racing Towards Practical Timing Attacks Daniel Mayer , Joel Sandin , Matasano Security
The Devil Does Not Exist - The Role of Deception in Cyber Mark Mateski , Matt Devost , Red Team Journal , FusionX, LLC
My Google Glass Sees Your Passwords! Xinwen Fu , Qinggang Yue , Zhen Ling , University of Massachusetts Lowell , Southeast University
Researching Android Device Security with the Help of a Droid Army Joshua Drake , Accuvant LABS
From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices Tony Sager , Council on CyberSecurity
SVG: Exploiting Browsers without Image Parsing Bugs Rennie deGraaf , iSEC Partners
How to Wear Your Password Markus Jakobsson , Qualcomm
Extreme Privilege Escalation on Windows 8/UEFI Systems Corey Kallenberg , Xeno Kovah , John Butterworth , Samuel Cornwell , The MITRE Corporation
Abusing Microsoft Kerberos: Sorry You Guys Don't Get It Alva Duckwall , Benjamin Delpy , Unnamed Startup
"Nobody is Listening to Your Phone Calls." Really? A Debate and Discussion on the NSA's Activities Mark Jaycox , Jamil Jaffer , Electronic Frontier Foundation , George Mason University School of Law
Oracle Data Redaction is Broken David Litchfield , Datacom TSS
Why You Need to Detect More Than PtH Matthew Hathaway , Jeff Myers , Rapid7
A Journey to Protect Points-of-Sale Nir Valtman , NCR
Reflections on Trusting TrustZone Dan Rosenberg , Azimuth Security
Epidemiology of Software Vulnerabilities: A Study of Attack Surface Spread Kymberlee Price , Jake Kouns , Synack , Risk Based Security
The Big Chill: Legal Landmines that Stifle Security Research and How to Disarm Them Trey Ford , Marcia Hofmann , Kevin Bankston , Rapid7 , Law Office of Marcia Hofmann , New America Foundation
Investigating PowerShell Attacks Ryan Kazanciyan , Matt Hastings , Mandiant, a division of FireEye, Inc.
RAVAGE - Runtime Analysis of Vulnerabilities and Generation of Exploits Xiaoran Wang , Yoel Gluck , Salesforce.com
Poacher Turned Gamekeeper: Lessons Learned from Eight Years of Breaking Hypervisors Rafal Wojtczuk , Bromium
Babar-ians at the Gate: Data Protection at Massive Scale Davi Ottenheimer , EMC
BadUSB - On Accessories that Turn Evil Karsten Nohl , Jakob Lell , SRLabs
The BEAST Wins Again: Why TLS Keeps Failing to Protect HTTP Antoine Delignat-Lavaud , Inria Paris
Prevalent Characteristics in Modern Malware Rodrigo Branco , Gabriel Negreira Barbosa , Intel Corporation
Catching Malware En Masse: DNS and IP Style Dhia Mahjoub , Thibault Reuille , Andree Toonk , OpenDNS
A Practical Attack Against VDI Solutions Daniel Brodie , Michael Shaulov , Lacoon Mobile Security
Data-Only Pwning Microsoft Windows Kernel: Exploitation of Kernel Pool Overflows on Microsoft Windows 8.1 Nikita Tarakanov
VoIP Wars: Attack of the Cisco Phones Fatih Ozavci , Sense of Security Pty Ltd
Abusing Performance Optimization Weaknesses to Bypass ASLR Byoungyoung Lee , Yeongjin Jang , Tielei Wang , Georgia Institute of Technology
Fingerprinting Web Application Platforms by Variations in PNG Implementations Dominique Bongard , 0xcite SARL
Building Safe Systems at Scale - Lessons from Six Months at Yahoo Alex Stamos , Yahoo!
Evasion of High-End IPS Devices in the Age of IPv6 Antonios Atlasis , Enno Rey , secfu.net , ERNW GmbH
Hacking the Wireless World with Software Defined Radio - 2.0 Balint Seeber