• Wednesday, August 7
  • ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended

    William Burke
    Wed, 10:30 - 10:55
    Lagoon JKL
  • Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine

    Joe Bialek
    Wed, 11:15 - 12:05
    Lagoon JKL
  • The Path Less Traveled: Abusing Kubernetes Defaults

    Ian Coldwater, Duffie Cooley
    Wed, 13:30 - 14:20
    Lagoon JKL
  • Come Join the CAFSA - Continuous Automated Firmware Security Analysis

    Collin Mulliner
    Wed, 14:40 - 15:30
    Lagoon JKL
  • Internet-Scale Analysis of AWS Cognito Security

    Andres Riancho
    Wed, 16:00 - 16:50
    Lagoon JKL
  • MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection

    Colin O'Flynn
    Wed, 17:05 - 17:30
    Lagoon JKL
  • Thursday, August 8
  • Mobile Interconnect Threats: How Next-Gen Products May be Already Outdated

    Guillaume Teissier
    Thu, 09:00 - 09:25
    Lagoon JKL
  • Playing Offense and Defense with Deepfakes

    Matt Price, Mike Price
    Thu, 09:45 - 10:35
    Lagoon JKL
  • Women in Security: Building a Female InfoSec Community in Korea, Japan, and Taiwan

    Suhee Kang, Asuka Nakajima, Hazel Yen
    Thu, 11:00 - 11:50
    Lagoon JKL
  • Infighting Among Russian Security Services in the Cyber Sphere

    Kimberly Zenz
    Thu, 12:10 - 13:00
    Lagoon JKL
  • Automation Techniques in C++ Reverse Engineering

    Rolf Rolles
    Thu, 14:30 - 15:20
    Lagoon JKL
  • Adventures in the Underland: The CQForensic Toolkit as a Unique Weapon Against Hackers

    Paula Januszkiewicz
    Thu, 15:50 - 16:40
    Lagoon JKL
  • Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory

    Dimiter Andonov, Omar Sardar
    Thu, 17:00 - 18:00
    Lagoon JKL