• Wednesday, August 7
  • Detecting Deep Fakes with Mice

    Alex Comerford, Jonathan Saunders, George Williams
    Wed, 10:30 - 10:55
    Lagoon GHI
  • Dragonblood: Attacking the Dragonfly Handshake of WPA3

    Mathy Vanhoef
    Wed, 11:15 - 12:05
    Lagoon GHI
  • I'm Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy

    Matt Wixey
    Wed, 13:30 - 14:20
    Lagoon GHI
  • Look, No Hands! -- The Remote, Interaction-less Attack Surface of the iPhone

    Natalie Silvanovich
    Wed, 14:40 - 15:30
    Lagoon GHI
  • Arm IDA and Cross Check: Reversing the Boeing 787's Core Network

    Ruben Santamarta
    Wed, 16:00 - 16:50
    Lagoon GHI
  • Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing

    Jonathan Metzman
    Wed, 17:05 - 17:30
    Lagoon GHI
  • Thursday, August 8
  • On Trust: Stories from the Front Lines

    Jamil Farshchi
    Thu, 09:00 - 09:25
    Lagoon GHI
  • Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller

    Alexandre Gazet, Alexander Matrosov
    Thu, 09:45 - 10:35
    Lagoon GHI
  • Breaking Encrypted Databases: Generic Attacks on Range Queries

    Marie-Sarah Lacharite
    Thu, 11:00 - 11:50
    Lagoon GHI
  • Exploiting Qualcomm WLAN and Modem Over The Air

    Xiling Gong, Peter Pi
    Thu, 12:10 - 13:00
    Lagoon GHI
  • Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps

    Maddie Stone
    Thu, 14:30 - 15:20
    Lagoon GHI
  • Securing Apps in the Open-By-Default Cloud

    Winston Howes, Michael Wozniak
    Thu, 15:50 - 16:40
    Lagoon GHI
  • Exploring the New World : Remote Exploitation of SQLite and Curl

    YuXiang Li, Wenxiang Qian, HuiYu Wu
    Thu, 17:00 - 18:00
    Lagoon GHI