Star 1

Talks

Title Humans
Looking for Malicious Hardware Implants with Minimal Equipment Leviathan Security Group
Firetalk #3: Équipe Rouge: The Ethics of Prosecuting An Offensive Security Campaign Splunk
Writing a Fuzzer for Any Language with American Fuzzy Lop Ariel Zelivansky
Five-sigma Network Events (and how to find them) Edgewise Networks
Firemen vs. Safety Matches: How the current skills pipeline is wrong
Process Control Through Counterfeit Comms: Using and Abusing Built-In Functionality to Own a PLC Cisco Systems
The APT at Home: The attacker that knows your mother’s maiden name
Social Network Analysis: A scary primer
Trip Wire(less)
CryptoLocker Deep-Dive: Tracking security threats on the Bitcoin public ledger
Ground Truth: 18 vendors, 6000 firmware images, 2.7 million binaries, and a flaw in the Linux/MIPS stack Mudge , CITL
Firetalk #5: Infosec and 9-1-1: When the Location of Your Emergency is in the Building
How the Press Gets Pwned David Huerta
Kinder Garten Security: Teaching the Pre-college Crowd
Between Two Moose Bruce Potter , Whitney Merrill , LosT
Machine Learning Models that Predict Mental Health Status on Twitter and Their Privacy Implications Rachel Greenstadt , Drexel University
Firetalk #2: Specialists versus Jack-Of-All-Trades
BECs and Beyond: Investigating and Defending Office 365 Mandiant
A Little Birdy Told Me About Your Warrants
Mentoring the Intelligent Deviant: What the special operations and infosec communities can learn from each other
A Tisket, a Tasket, a Dark Web Shopping Basket Terbium Labs
Electronic Voting in 2018: Bad or Worse? Matt Blaze
Incident Response and the Attorney Client Privilege Wendy Knox Everette , Leviathan Security Group
It’s 2019 and Special Agent Johnny Still Can’t Encrypt Matt Blaze
The Beginner’s Guide to the Musical Scales of Cyberwar
Three Ways DuckDuckGo Protects User Privacy While Getting Things Done (and how you can too)
Firetalk #4: Weapons of Text Destruction MITRE
Post-quantum Crypto: Today’s defense against tomorrow’s quantum hacker
Patchwerk: Kernel Patching for Fun and Profit Battelle Memorial Institute
Analyzing Shodan Images With Optical Character Recognition
Security Response Survival Skills Ben Ridgway
Firetalk #6: Whats the latest 411 on 419s?
Advancing a Scientific Approach to Security Tool Evaluations with MITRE ATT&CK™
Behind Enemy Lines: Inside the operations of a nation state’s cyber program Andrew Blaich , Michael Flossman , Lookout
0wn the Con The Shmoo Group
Reversing SR-IOV For Fun and Profit Intel Corporation
A Code Pirate’s Cutlass: Recovering Software Architecture from Embedded Binaries evm
High Confidence Malware Attribution using the Rich Header Seamus Burke
Building and Selling Solo, an Open Source Secure Hardware Token
Firetalk #1: Shut up and Listen
24/7 CTI: Operationalizing Cyber Threat Intelligence
Encrypting the Web Isn’t Enough: How EFF Plans to Encrypt the Entire Internet Electronic Frontier Foundation
IMSI Catchers Demystified Karl Koscher
Be an IoT Safety Hero: Policing Unsafe IoT through the Consumer Product Safety Commission Andrea Matwyshyn
Un-f*$#ing Cloud Storage Encryption
Ad-Laundering: Bribes & Backdoors Novetta
Deconstructing DeFeNeStRaTe.C
IPv666: Address of the Beast Marc Newlin
iPhone Surgery for the Practically Paranoid