Looking for Malicious Hardware Implants with Minimal Equipment
|
Leviathan Security Group
|
Firetalk #3: Équipe Rouge: The Ethics of Prosecuting An Offensive Security Campaign
|
Splunk
|
Writing a Fuzzer for Any Language with American Fuzzy Lop
|
Ariel Zelivansky
|
Five-sigma Network Events (and how to find them)
|
Edgewise Networks
|
Firemen vs. Safety Matches: How the current skills pipeline is wrong
|
|
Process Control Through Counterfeit Comms: Using and Abusing Built-In Functionality to Own a PLC
|
Cisco Systems
|
The APT at Home: The attacker that knows your mother’s maiden name
|
|
Social Network Analysis: A scary primer
|
|
Trip Wire(less)
|
|
CryptoLocker Deep-Dive: Tracking security threats on the Bitcoin public ledger
|
|
Ground Truth: 18 vendors, 6000 firmware images, 2.7 million binaries, and a flaw in the Linux/MIPS stack
|
Mudge
,
CITL
|
Firetalk #5: Infosec and 9-1-1: When the Location of Your Emergency is in the Building
|
|
How the Press Gets Pwned
|
David Huerta
|
Kinder Garten Security: Teaching the Pre-college Crowd
|
|
Between Two Moose
|
Bruce Potter
,
Whitney Merrill
,
LosT
|
Machine Learning Models that Predict Mental Health Status on Twitter and Their Privacy Implications
|
Rachel Greenstadt
,
Drexel University
|
Firetalk #2: Specialists versus Jack-Of-All-Trades
|
|
BECs and Beyond: Investigating and Defending Office 365
|
Mandiant
|
A Little Birdy Told Me About Your Warrants
|
|
Mentoring the Intelligent Deviant: What the special operations and infosec communities can learn from each other
|
|
A Tisket, a Tasket, a Dark Web Shopping Basket
|
Terbium Labs
|
Electronic Voting in 2018: Bad or Worse?
|
Matt Blaze
|
Incident Response and the Attorney Client Privilege
|
Wendy Knox Everette
,
Leviathan Security Group
|
It’s 2019 and Special Agent Johnny Still Can’t Encrypt
|
Matt Blaze
|
The Beginner’s Guide to the Musical Scales of Cyberwar
|
|
Three Ways DuckDuckGo Protects User Privacy While Getting Things Done (and how you can too)
|
|
Firetalk #4: Weapons of Text Destruction
|
MITRE
|
Post-quantum Crypto: Today’s defense against tomorrow’s quantum hacker
|
|
Patchwerk: Kernel Patching for Fun and Profit
|
Battelle Memorial Institute
|
Analyzing Shodan Images With Optical Character Recognition
|
|
Security Response Survival Skills
|
Ben Ridgway
|
Firetalk #6: Whats the latest 411 on 419s?
|
|
Advancing a Scientific Approach to Security Tool Evaluations with MITRE ATT&CK™
|
|
Behind Enemy Lines: Inside the operations of a nation state’s cyber program
|
Andrew Blaich
,
Michael Flossman
,
Lookout
|
0wn the Con
|
The Shmoo Group
|
Reversing SR-IOV For Fun and Profit
|
Intel Corporation
|
A Code Pirate’s Cutlass: Recovering Software Architecture from Embedded Binaries
|
evm
|
High Confidence Malware Attribution using the Rich Header
|
Seamus Burke
|
Building and Selling Solo, an Open Source Secure Hardware Token
|
|
Firetalk #1: Shut up and Listen
|
|
24/7 CTI: Operationalizing Cyber Threat Intelligence
|
|
Encrypting the Web Isn’t Enough: How EFF Plans to Encrypt the Entire Internet
|
Electronic Frontier Foundation
|
IMSI Catchers Demystified
|
Karl Koscher
|
Be an IoT Safety Hero: Policing Unsafe IoT through the Consumer Product Safety Commission
|
Andrea Matwyshyn
|
Un-f*$#ing Cloud Storage Encryption
|
|
Ad-Laundering: Bribes & Backdoors
|
Novetta
|
Deconstructing DeFeNeStRaTe.C
|
|
IPv666: Address of the Beast
|
Marc Newlin
|
iPhone Surgery for the Practically Paranoid
|
|