• Wednesday, August 7
  • A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works

    Sze Yiu Chau
    Wed, 10:30 - 10:55
    Jasmine
  • APIC's Adventures in Wonderland

    Frank Block, Oliver Matula
    Wed, 11:15 - 12:05
    Jasmine
  • It's Not What You Know, It's What You Do: How Data Can Shape Security Engagement

    Masha Sedova, Aika Sengirbay
    Wed, 13:30 - 14:20
    Jasmine
  • Lessons From Two Years of Crypto Audits

    Jean-Philippe Aumasson
    Wed, 14:40 - 15:30
    Jasmine
  • Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover

    Nick Landers
    Wed, 16:00 - 16:50
    Jasmine
  • PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary

    Dokyung Song
    Wed, 17:05 - 17:30
    Jasmine
  • Thursday, August 8
  • The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring

    Andrea Carcano, Younes Dragoni, Alessandro Di Pinto
    Thu, 09:00 - 09:25
    Jasmine
  • Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities

    Nathan Hauke, David Renardy
    Thu, 09:45 - 10:35
    Jasmine
  • Operational Templates for State-Level Attack and Collective Defense of Countries

    Greg Conti, Robert Fanelli
    Thu, 11:00 - 11:50
    Jasmine
  • Firmware Cartography: Charting the Course for Modern Server Compromise

    Dion Blazakis, Nathan Keltner
    Thu, 12:10 - 13:00
    Jasmine
  • Inside the Apple T2

    Mikhail Davidov, Jeremy Erickson
    Thu, 14:30 - 15:20
    Jasmine
  • The Future of ATO

    Philip Martin
    Thu, 15:50 - 16:40
    Jasmine
  • Shifting Knowledge Left: Keeping up with Modern Application Security

    Fletcher Heisler, Mark Stanislav
    Thu, 17:00 - 18:00
    Jasmine