• 0
  • 0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars

    Zhiqiang Cai, Michael Gruffke, Hendrik Schweppe, Aohui Wang, Wenkai Zhang
    Thu, 12:10 - 13:00
    South Seas ABE
  • 1
  • 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans

    Ang Cui, Richard Housley, Jatin Kataria
    Thu, 09:45 - 10:35
    Islander FG
  • A
  • A Compendium of Container Escapes

    Brandon Edwards, Nick Freeman
    Thu, 15:50 - 16:40
    South Seas ABE
  • A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works

    Sze Yiu Chau
    Wed, 10:30 - 10:55
    Jasmine
  • Adventures in the Underland: The CQForensic Toolkit as a Unique Weapon Against Hackers

    Paula Januszkiewicz
    Thu, 15:50 - 16:40
    Lagoon JKL
  • All the 4G Modules Could be Hacked

    Shupeng Gao, Zheng Huang, Haikuo Xie, Zhang Ye
    Wed, 13:30 - 14:20
    South Seas CDF
  • All Your Apple are Belong to Us: Unique Identification and Cross-Device Tracking of Apple Devices

    Xiaolong Bai, Min Zheng
    Thu, 09:45 - 10:35
    South Pacific
  • APIC's Adventures in Wonderland

    Frank Block, Oliver Matula
    Wed, 11:15 - 12:05
    Jasmine
  • API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web

    Joshua Maddux
    Thu, 11:00 - 11:50
    Islander FG
  • Arm IDA and Cross Check: Reversing the Boeing 787's Core Network

    Ruben Santamarta
    Wed, 16:00 - 16:50
    Lagoon GHI
  • Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD)

    Sean Metcalf, Mark Morowczynski
    Wed, 11:15 - 12:05
    South Pacific
  • Attacking Electric Motors for Fun and Profit

    Matthew Jablonski, Duminda Wijesekera
    Wed, 11:15 - 12:05
    Islander FG
  • Attacking iPhone XS Max

    Tielei Wang, Hao Xu
    Thu, 15:50 - 16:40
    South Pacific
  • Attack Surface as a Service

    Anna Westelius
    Thu, 09:00 - 09:25
    South Pacific
  • Automation Techniques in C++ Reverse Engineering

    Rolf Rolles
    Thu, 14:30 - 15:20
    Lagoon JKL
  • B
  • Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers

    Sheila A. Berta
    Thu, 14:30 - 15:20
    South Pacific
  • Battle of Windows Service: A Silver Bullet to Discover File Privilege Escalation Bugs Automatically

    Wenxu Wu
    Wed, 10:30 - 10:55
    South Seas ABE
  • Behind the Scenes of Intel Security and Manageability Engine

    Shai Hasarfaty, Yanai Moyal
    Wed, 13:30 - 14:20
    Islander EI
  • Behind the scenes of iOS and Mac Security

    Ivan Krstić
    Thu, 12:10 - 13:00
    South Pacific
  • Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware

    Oliver Bilodeau, Masarah Paquet-Clouston
    Wed, 11:15 - 12:05
    South Seas ABE
  • Biometric Authentication Under Threat: Liveness Detection Hacking

    Yu Chen, Bin Ma, Zhuo Ma
    Wed, 10:30 - 10:55
    Islander EI
  • Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months

    Gregory Caswell, Brett Goldstein, Josh Jay, Shannon Sabens, Jarek Stanley
    Thu, 11:00 - 11:50
    Mandalay Bay CD
  • Breaking Encrypted Databases: Generic Attacks on Range Queries

    Marie-Sarah Lacharite
    Thu, 11:00 - 11:50
    Lagoon GHI
  • Breaking Samsung's ARM TrustZone

    Alexandre Adamski, Joffrey Guilbon, Maxime Peterlin
    Thu, 17:00 - 18:00
    South Seas CDF
  • Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller

    Alexandre Gazet, Alexander Matrosov
    Thu, 09:45 - 10:35
    Lagoon GHI
  • Bypassing the Maginot Line: Remotely Exploit the Hardware Decoder on Smartphone

    Xiling Gong, Peter Pi
    Wed, 10:30 - 10:55
    Islander FG
  • C
  • Chip.Fail - Glitching the Silicon of the Connected World

    Josh Datko, Thomas Roth
    Wed, 14:40 - 15:30
    Islander FG
  • ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended

    William Burke
    Wed, 10:30 - 10:55
    Lagoon JKL
  • Come Join the CAFSA - Continuous Automated Firmware Security Analysis

    Collin Mulliner
    Wed, 14:40 - 15:30
    Lagoon JKL
  • Command Injection in F5 iRules

    Christoffer Jerkeby
    Thu, 17:00 - 18:00
    Islander EI
  • Controlled Chaos: The Inevitable Marriage of DevOps & Security

    Nicole Forsgren, Kelly Shortridge
    Wed, 16:00 - 16:50
    South Pacific
  • Critical Zero Days Remotely Compromise the Most Popular Real-Time OS

    Ben Seri, Dor Zusman
    Thu, 14:30 - 15:20
    South Seas CDF
  • Cyber Insurance 101 for CISO’s

    Jeffrey Smith
    Wed, 13:30 - 14:20
    Mandalay Bay CD
  • Cybersecurity Risk Assessment for Safety-Critical Systems

    Ken Heffner, Daniel Johnson, Ly Vessels
    Wed, 17:05 - 17:30
    South Pacific
  • D
  • Death to the IOC: What's Next in Threat Intelligence

    Bhavna Soman
    Thu, 09:00 - 09:25
    South Seas ABE
  • Debug for Bug: Crack and Hack Apple Core by Itself - Fun and Profit to Debug and Fuzz Apple Kernel by lldb Script

    Moony Li, Lilang Wu
    Thu, 17:00 - 18:00
    Breakers GHI
  • Deconstructing the Phishing Campaigns that Target Gmail Users

    Elie Bursztein, Daniela Oliveira
    Wed, 17:05 - 17:30
    South Seas ABE
  • Defense Against Rapidly Morphing DDOS

    Mikhail Fedorov, Mudit Tyagi
    Wed, 17:05 - 17:30
    South Seas CDF
  • Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities

    Nathan Hauke, David Renardy
    Thu, 09:45 - 10:35
    Jasmine
  • Detecting Deep Fakes with Mice

    Alex Comerford, Jonathan Saunders, George Williams
    Wed, 10:30 - 10:55
    Lagoon GHI
  • Detecting Malicious Files with YARA Rules as They Traverse the Network

    David Bernal
    Wed, 17:05 - 17:30
    Islander FG
  • DevSecOps : What, Why and How

    Anant Shrivastava
    Thu, 11:00 - 11:50
    South Pacific
  • Dragonblood: Attacking the Dragonfly Handshake of WPA3

    Mathy Vanhoef
    Wed, 11:15 - 12:05
    Lagoon GHI
  • E
  • Everybody be Cool, This is a Robbery!

    Jean-Baptiste Bédrune, Gabriel Campana
    Thu, 15:50 - 16:40
    Islander EI
  • Every Security Team is a Software Team Now

    Dino Dai Zovi
    Wed, 09:00 - 10:00
    Mandalay Bay Events Center
  • Exploiting Qualcomm WLAN and Modem Over The Air

    Xiling Gong, Peter Pi
    Thu, 12:10 - 13:00
    Lagoon GHI
  • Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine

    Joe Bialek
    Wed, 11:15 - 12:05
    Lagoon JKL
  • Exploring the New World : Remote Exploitation of SQLite and Curl

    YuXiang Li, Wenxiang Qian, HuiYu Wu
    Thu, 17:00 - 18:00
    Lagoon GHI
  • F
  • Fantastic Red-Team Attacks and How to Find Them

    Casey Smith, Ross Wolf
    Thu, 14:30 - 15:20
    South Seas ABE
  • Finding a Needle in an Encrypted Haystack: Leveraging Cryptographic Abilities to Detect the Most Prevalent Attacks on Active Directory

    Marina Simakov, Yaron Zinar
    Wed, 14:40 - 15:30
    South Seas CDF
  • Finding Our Path: How We're Trying to Improve Active Directory Security

    Andy Robbins, Will Schroeder, Rohan Vazarkar
    Thu, 11:00 - 11:50
    South Seas ABE
  • Firmware Cartography: Charting the Course for Modern Server Compromise

    Dion Blazakis, Nathan Keltner
    Thu, 12:10 - 13:00
    Jasmine
  • Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover

    Nick Landers
    Wed, 16:00 - 16:50
    Jasmine
  • G
  • GDPArrrrr: Using Privacy Laws to Steal Identities

    James Pavur
    Thu, 09:00 - 09:25
    Islander EI
  • Ghidra - Journey from Classified NSA Tool to Open Source

    Chris Delikat, Brian Knighton
    Thu, 12:10 - 13:00
    Islander EI
  • Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing

    Jonathan Metzman
    Wed, 17:05 - 17:30
    Lagoon GHI
  • H
  • Hacking for the Greater Good: Empowering Technologists to Strengthen Digital Society

    Camille Francois, Eva Galperin, Bruce Schneier
    Wed, 11:15 - 12:05
    South Seas CDF
  • Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project

    Pablo Breuer, David Perlman
    Thu, 15:50 - 16:40
    South Seas CDF
  • Hacking Your Non-Compete

    Brian Dykstra, Gregory Stone
    Wed, 16:00 - 16:50
    Islander FG
  • He Said, She Said – Poisoned RDP Offense and Defense

    Dana Baril, Eyal Itkin
    Wed, 16:00 - 16:50
    South Seas ABE
  • HostSplit: Exploitable Antipatterns in Unicode Normalization

    Jonathan Birch
    Thu, 15:50 - 16:40
    Breakers GHI
  • How Do Cyber Insurers View The World?

    Matt Prevost
    Wed, 16:00 - 16:50
    Mandalay Bay CD
  • How to Detect that Your Domains are Being Abused for Phishing by Using DNS

    Arnold Hölzel, Karl Lovink
    Thu, 17:00 - 18:00
    South Pacific
  • HTTP Desync Attacks: Smashing into the Cell Next Door

    James Kettle
    Wed, 13:30 - 14:20
    Islander FG
  • Hunting for Bugs, Catching Dragons

    Nicolas Joly
    Wed, 16:00 - 16:50
    South Seas CDF
  • I
  • I'm Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy

    Matt Wixey
    Wed, 13:30 - 14:20
    Lagoon GHI
  • Infighting Among Russian Security Services in the Cyber Sphere

    Kimberly Zenz
    Thu, 12:10 - 13:00
    Lagoon JKL
  • Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs

    Meh Chang, Orange Tsai
    Wed, 14:40 - 15:30
    Islander EI
  • Information Security in the Public Interest

    Bruce Schneier
    Thu, 09:45 - 10:35
    South Seas ABE
  • Inside the Apple T2

    Mikhail Davidov, Jeremy Erickson
    Thu, 14:30 - 15:20
    Jasmine
  • Integration of Cyber Insurance Into A Risk Management Program

    Jake Kouns
    Wed, 14:40 - 15:30
    Mandalay Bay CD
  • Internet-Scale Analysis of AWS Cognito Security

    Andres Riancho
    Wed, 16:00 - 16:50
    Lagoon JKL
  • It's Not What You Know, It's What You Do: How Data Can Shape Security Engagement

    Masha Sedova, Aika Sengirbay
    Wed, 13:30 - 14:20
    Jasmine
  • L
  • Legal GNSS Spoofing and its Effects on Autonomous Vehicles

    Victor Murray
    Wed, 10:30 - 10:55
    Breakers GHI
  • Lessons and Lulz: The 5th Annual Black Hat USA NOC Report

    Bart Stump, Neil Wyler
    Thu, 17:00 - 18:00
    South Seas ABE
  • Lessons From Two Years of Crypto Audits

    Jean-Philippe Aumasson
    Wed, 14:40 - 15:30
    Jasmine
  • Look, No Hands! -- The Remote, Interaction-less Attack Surface of the iPhone

    Natalie Silvanovich
    Wed, 14:40 - 15:30
    Lagoon GHI
  • M
  • Making Big Things Better the Dead Cow Way

    Luke Benfey, Joseph Menn, Christien Rioux, Peiter Zatko
    Thu, 14:30 - 15:20
    Islander FG
  • Managing for Success: Maintaining a Healthy Bug Bounty Program Long Term

    Chloe Brown
    Thu, 12:10 - 13:00
    Mandalay Bay CD
  • Messaging Layer Security: Towards a New Era of Secure Group Messaging

    Benjamin Beurdouche, Katriel Cohn-Gordon, Raphael Robert
    Wed, 16:00 - 16:50
    Breakers GHI
  • MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection

    Colin O'Flynn
    Wed, 17:05 - 17:30
    Lagoon JKL
  • MITRE ATT&CK: The Play at Home Edition

    Ryan Kovar, Katie Nickels
    Wed, 14:40 - 15:30
    South Pacific
  • Mobile Interconnect Threats: How Next-Gen Products May be Already Outdated

    Guillaume Teissier
    Thu, 09:00 - 09:25
    Lagoon JKL
  • Monsters in the Middleboxes: Building Tools for Detecting HTTPS Interception

    Gabriele Fisher, Luke Valenta
    Wed, 10:30 - 10:55
    South Seas CDF
  • Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites

    Ray ., Michael Huebler
    Thu, 17:00 - 18:00
    Islander FG
  • N
  • New Vulnerabilities in 5G Networks

    Ravishankar Borgaonkar, Altaf Shaik
    Wed, 13:30 - 14:20
    South Pacific
  • O
  • On Trust: Stories from the Front Lines

    Jamil Farshchi
    Thu, 09:00 - 09:25
    Lagoon GHI
  • Operational Templates for State-Level Attack and Collective Defense of Countries

    Greg Conti, Robert Fanelli
    Thu, 11:00 - 11:50
    Jasmine
  • P
  • Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory

    Dimiter Andonov, Omar Sardar
    Thu, 17:00 - 18:00
    Lagoon JKL
  • PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary

    Dokyung Song
    Wed, 17:05 - 17:30
    Jasmine
  • PicoDMA: DMA Attacks at Your Fingertips

    Ben Blaxill, Joel Sandin
    Wed, 11:15 - 12:05
    Breakers GHI
  • Planning a Bug Bounty: The Nuts and Bolts from Concept to Launch

    Adam Ruddermann
    Thu, 09:45 - 10:35
    Mandalay Bay CD
  • Playing Offense and Defense with Deepfakes

    Matt Price, Mike Price
    Thu, 09:45 - 10:35
    Lagoon JKL
  • Practical Approach to Automate the Discovery and Eradication of Open-Source Software Vulnerabilities at Scale

    Aladdin Almubayed
    Thu, 12:10 - 13:00
    Islander FG
  • Predictive Vulnerability Scoring System

    Jay Jacobs, Michael Roytman
    Thu, 12:10 - 13:00
    South Seas CDF
  • Preventing Authentication Bypass: A Tale of Two Researchers

    Ron Chan, Ravi Jaiswal, Terry Zhang
    Thu, 14:30 - 15:20
    Islander EI
  • Process Injection Techniques - Gotta Catch Them All

    Amit Klein, Itzik Kotler
    Thu, 11:00 - 11:50
    South Seas CDF
  • Project Zero: Five Years of "Make 0Day Hard"

    Ben Hawkes
    Thu, 09:45 - 10:35
    South Seas CDF
  • R
  • Responding to a Cyber Attack with Missiles

    Mikko Hypponen
    Wed, 14:40 - 15:30
    South Seas ABE
  • Reverse Engineering WhatsApp Encryption for Chat Manipulation and More

    Oded Vanunu, Roman Zaikin
    Wed, 17:05 - 17:30
    Islander EI
  • Rogue7: Rogue Engineering-Station Attacks on S7 Simatic PLCs

    Eli Biham, Sara Bitan, Uriel Malin, Avishai Wool
    Thu, 11:00 - 11:50
    Breakers GHI
  • Rough and Ready: Frameworks to Measure Persistent Engagement and Deterrence

    Jason Healey, Neil Jenkins
    Thu, 09:45 - 10:35
    Breakers GHI
  • S
  • Securing Apps in the Open-By-Default Cloud

    Winston Howes, Michael Wozniak
    Thu, 15:50 - 16:40
    Lagoon GHI
  • Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps

    Maddie Stone
    Thu, 14:30 - 15:20
    Lagoon GHI
  • Selling 0-Days to Governments and Offensive Security Companies

    Maor Shwartz
    Wed, 13:30 - 14:20
    South Seas ABE
  • Sensor and Process Fingerprinting in Industrial Control Systems

    Mujeeb Ahmed Chuadhry, Martin Ochoa
    Wed, 13:30 - 14:20
    Breakers GHI
  • Shifting Knowledge Left: Keeping up with Modern Application Security

    Fletcher Heisler, Mark Stanislav
    Thu, 17:00 - 18:00
    Jasmine
  • SSO Wars: The Token Menace

    Oleksandr Mirosh, Alvaro Munoz
    Wed, 10:30 - 10:55
    South Pacific
  • T
  • Testing Your Organization's Social Media Awareness

    Jacob Wilkin
    Thu, 09:00 - 09:25
    Breakers GHI
  • The Cyber Shell Game – War, Information Warfare, and the Darkening Web

    Alexander Klimburg
    Wed, 16:00 - 16:50
    Islander EI
  • The Discovery of a Government Malware and an Unexpected Spy Scandal

    Lorenzo Franceschi-Bicchierai
    Thu, 15:50 - 16:40
    Islander FG
  • The Enemy Within: Modern Supply Chain Attacks

    Eric Doerr
    Thu, 09:45 - 10:35
    Islander EI
  • The Future of ATO

    Philip Martin
    Thu, 15:50 - 16:40
    Jasmine
  • The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring

    Andrea Carcano, Younes Dragoni, Alessandro Di Pinto
    Thu, 09:00 - 09:25
    Jasmine
  • The Most Secure Browser? Pwning Chrome from 2016 to 2019

    Zhen Feng, Gengming Liu
    Wed, 11:15 - 12:05
    Islander EI
  • The Path Less Traveled: Abusing Kubernetes Defaults

    Ian Coldwater, Duffie Cooley
    Wed, 13:30 - 14:20
    Lagoon JKL
  • Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime

    Tao Huang, Tielei Wang
    Thu, 14:30 - 15:20
    Breakers GHI
  • Transparency in the Software Supply Chain: Making SBOM a Reality

    Allan Friedman
    Wed, 17:05 - 17:30
    Breakers GHI
  • W
  • WebAuthn 101 - Demystifying WebAuthn

    Christiaan Brand
    Thu, 09:00 - 09:25
    South Seas CDF
  • Woke Hiring Won't Save Us: An Actionable Approach to Diversity Hiring and Retention

    Rebecca Lynch
    Thu, 09:00 - 09:25
    Islander FG
  • Women in Security: Building a Female InfoSec Community in Korea, Japan, and Taiwan

    Suhee Kang, Asuka Nakajima, Hazel Yen
    Thu, 11:00 - 11:50
    Lagoon JKL
  • Worm Charming: Harvesting Malware Lures for Fun and Profit

    Pedram Amini
    Wed, 14:40 - 15:30
    Breakers GHI
  • Z
  • Zombie Ant Farming: Practical Tips for Playing Hide and Seek with Linux EDRs

    Dimitry Snezhkov
    Thu, 12:10 - 13:00
    Breakers GHI