Introducing DARPA's Cyber Grand Challenge
|
Mike Walker
|
Data Whales and Troll Tears: Beat the Odds in InfoSec
|
Davi Ottenheimer
|
You Don't Have the Evidence
|
|
Genuinely "Trusted Computing:" Free and Open Hardware Security Modules
|
Ryan Lackey
|
A Critical Review of Spatial Analysis
|
|
I Found a Thing and You Can (Should) Too: ISP's Unauthenticated SOAP Service = Find (Almost) All The Things!
|
|
Closing Plenary - Large Scale Scanning
|
Bruce Potter
,
Dan Tentler
,
Paul McMillan
|
An Open and Affordable USB Man in the Middle Device
|
Dominic Spill
|
Closing Remarks
|
|
Unambiguous Encapsulation
|
Michael Ossmann
,
Dominic Spill
|
Dissipation of Hackers in the Enterprise
|
|
NSA Capabilities and Countermeasures
|
Bruce Schneier
|
Timing-Based Attestation: Sexy Defense, or the Sexiest?
|
Xeno Kovah
,
Corey Kallenberg
,
John Butterworth
|
ADD - Complicating Memory Forensics Through Memory Disarray
|
|
Keynote - Privacy Online: What Now?
|
|
How Hackers for Charity (Possibly) Saved Me a Lot of Money
|
|
Opening Remarks Rumblings and Rants
|
|
Attacker Ghost Stories
|
|
Malicious Online Activities Related to the 2012 U.S. General Election
|
Damon McCoy
|
CCTV Setup, Attack Vectors, and Laws
|
|
Introducing idb - Simplified Blackbox iOS App Pentesting
|
|
AV Evasion With the Veil Framework (Part 2 of 2)
|
Will Schroeder
|
The "Science of Cyber" and the Next Generation of Security Tools
|
Paulo Shakarian
|
SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography
|
|
0wn the Con
|
The Shmoo Group
|
Practical Applications of Data Science in Detection
|
Mike Sconzo
|
LTE vs Darwin
|
Hendrik Schmidt
|
Operationalizing Threat Information Sharing: Beyond Policies and Platitudes
|
|
Raising Costs for Your Attackers Instead of Your CFO
|
|
Controlling USB Flash Drive Controllers: Expose of Hidden Features
|
|
Vehicle Forensics - The Data Beyond the Dashboard
|
|
Technology Law Issues for Security Professionals
|
|
Syncing Mentorship Between Winners And Beginners
|
|
Security Analytics: Less Hype, More Data
|
|
AV Evasion With the Veil Framework (Part 1 of 2)
|
Will Schroeder
|
Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms
|
|
Arms Race: The Story of (In)-Secure Bootloaders
|
Kang Li
|
How to Train your Snapdragon: Exploring Power Frameworks on Android
|
Josh "m0nk" Thomas
|
How I Met Your Mother
|
|
Saturday Fire Talks
|
|
Friday Fire Talks
|
|