• Wednesday, August 7
  • Legal GNSS Spoofing and its Effects on Autonomous Vehicles

    Victor Murray
    Wed, 10:30 - 10:55
    Breakers GHI
  • PicoDMA: DMA Attacks at Your Fingertips

    Ben Blaxill, Joel Sandin
    Wed, 11:15 - 12:05
    Breakers GHI
  • Sensor and Process Fingerprinting in Industrial Control Systems

    Mujeeb Ahmed Chuadhry, Martin Ochoa
    Wed, 13:30 - 14:20
    Breakers GHI
  • Worm Charming: Harvesting Malware Lures for Fun and Profit

    Pedram Amini
    Wed, 14:40 - 15:30
    Breakers GHI
  • Messaging Layer Security: Towards a New Era of Secure Group Messaging

    Benjamin Beurdouche, Katriel Cohn-Gordon, Raphael Robert
    Wed, 16:00 - 16:50
    Breakers GHI
  • Transparency in the Software Supply Chain: Making SBOM a Reality

    Allan Friedman
    Wed, 17:05 - 17:30
    Breakers GHI
  • Thursday, August 8
  • Testing Your Organization's Social Media Awareness

    Jacob Wilkin
    Thu, 09:00 - 09:25
    Breakers GHI
  • Rough and Ready: Frameworks to Measure Persistent Engagement and Deterrence

    Jason Healey, Neil Jenkins
    Thu, 09:45 - 10:35
    Breakers GHI
  • Rogue7: Rogue Engineering-Station Attacks on S7 Simatic PLCs

    Eli Biham, Sara Bitan, Uriel Malin, Avishai Wool
    Thu, 11:00 - 11:50
    Breakers GHI
  • Zombie Ant Farming: Practical Tips for Playing Hide and Seek with Linux EDRs

    Dimitry Snezhkov
    Thu, 12:10 - 13:00
    Breakers GHI
  • Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime

    Tao Huang, Tielei Wang
    Thu, 14:30 - 15:20
    Breakers GHI
  • HostSplit: Exploitable Antipatterns in Unicode Normalization

    Jonathan Birch
    Thu, 15:50 - 16:40
    Breakers GHI
  • Debug for Bug: Crack and Hack Apple Core by Itself - Fun and Profit to Debug and Fuzz Apple Kernel by lldb Script

    Moony Li, Lilang Wu
    Thu, 17:00 - 18:00
    Breakers GHI