Star 0

Talks

Title Humans
Introducing DARPA's Cyber Grand Challenge Mike Walker
Data Whales and Troll Tears: Beat the Odds in InfoSec Davi Ottenheimer
You Don't Have the Evidence
Genuinely "Trusted Computing:" Free and Open Hardware Security Modules Ryan Lackey
A Critical Review of Spatial Analysis
I Found a Thing and You Can (Should) Too: ISP's Unauthenticated SOAP Service = Find (Almost) All The Things!
Closing Plenary - Large Scale Scanning Bruce Potter , Dan Tentler , Paul McMillan
An Open and Affordable USB Man in the Middle Device Dominic Spill
Closing Remarks
Unambiguous Encapsulation Michael Ossmann , Dominic Spill
Dissipation of Hackers in the Enterprise
NSA Capabilities and Countermeasures Bruce Schneier
Timing-Based Attestation: Sexy Defense, or the Sexiest? Xeno Kovah , Corey Kallenberg , John Butterworth
ADD - Complicating Memory Forensics Through Memory Disarray
Keynote - Privacy Online: What Now?
How Hackers for Charity (Possibly) Saved Me a Lot of Money
Opening Remarks Rumblings and Rants
Attacker Ghost Stories
Malicious Online Activities Related to the 2012 U.S. General Election Damon McCoy
CCTV Setup, Attack Vectors, and Laws
Introducing idb - Simplified Blackbox iOS App Pentesting
AV Evasion With the Veil Framework (Part 2 of 2) Will Schroeder
The "Science of Cyber" and the Next Generation of Security Tools Paulo Shakarian
SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography
0wn the Con The Shmoo Group
Practical Applications of Data Science in Detection Mike Sconzo
LTE vs Darwin Hendrik Schmidt
Operationalizing Threat Information Sharing: Beyond Policies and Platitudes
Raising Costs for Your Attackers Instead of Your CFO
Controlling USB Flash Drive Controllers: Expose of Hidden Features
Vehicle Forensics - The Data Beyond the Dashboard
Technology Law Issues for Security Professionals
Syncing Mentorship Between Winners And Beginners
Security Analytics: Less Hype, More Data
AV Evasion With the Veil Framework (Part 1 of 2) Will Schroeder
Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms
Arms Race: The Story of (In)-Secure Bootloaders Kang Li
How to Train your Snapdragon: Exploring Power Frameworks on Android Josh "m0nk" Thomas
How I Met Your Mother
Saturday Fire Talks
Friday Fire Talks