• Wednesday, August 7
  • Bypassing the Maginot Line: Remotely Exploit the Hardware Decoder on Smartphone

    Xiling Gong, Peter Pi
    Wed, 10:30 - 10:55
    Islander FG
  • Attacking Electric Motors for Fun and Profit

    Matthew Jablonski, Duminda Wijesekera
    Wed, 11:15 - 12:05
    Islander FG
  • HTTP Desync Attacks: Smashing into the Cell Next Door

    James Kettle
    Wed, 13:30 - 14:20
    Islander FG
  • Chip.Fail - Glitching the Silicon of the Connected World

    Josh Datko, Thomas Roth
    Wed, 14:40 - 15:30
    Islander FG
  • Hacking Your Non-Compete

    Brian Dykstra, Gregory Stone
    Wed, 16:00 - 16:50
    Islander FG
  • Detecting Malicious Files with YARA Rules as They Traverse the Network

    David Bernal
    Wed, 17:05 - 17:30
    Islander FG
  • Thursday, August 8
  • Woke Hiring Won't Save Us: An Actionable Approach to Diversity Hiring and Retention

    Rebecca Lynch
    Thu, 09:00 - 09:25
    Islander FG
  • 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans

    Ang Cui, Richard Housley, Jatin Kataria
    Thu, 09:45 - 10:35
    Islander FG
  • API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web

    Joshua Maddux
    Thu, 11:00 - 11:50
    Islander FG
  • Practical Approach to Automate the Discovery and Eradication of Open-Source Software Vulnerabilities at Scale

    Aladdin Almubayed
    Thu, 12:10 - 13:00
    Islander FG
  • Making Big Things Better the Dead Cow Way

    Luke Benfey, Joseph Menn, Christien Rioux, Peiter Zatko
    Thu, 14:30 - 15:20
    Islander FG
  • The Discovery of a Government Malware and an Unexpected Spy Scandal

    Lorenzo Franceschi-Bicchierai
    Thu, 15:50 - 16:40
    Islander FG
  • Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites

    Ray ., Michael Huebler
    Thu, 17:00 - 18:00
    Islander FG