• Friday, August 9
  • Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware

    Oliver Bilodeau, Masarah Paquet-Clouston
    Fri, 10:00 - 10:45
    Track 3
  • All the 4G modules Could be Hacked

    Zheng Huang, Xiao Hui Hui, Ye Zhang
    Fri, 11:00 - 11:45
    Track 3
  • Infiltrating Corporate Intranet Like NSA ̶Pre-auth RCE on Leading SSL VPNs

    Meh Chang, Orange Tsai
    Fri, 12:00 - 12:45
    Track 3
  • No Mas – How One Side-Channel Flaw Opens Atm, Pharmacies and Government Secrets Up to Attack

    Mike Davis
    Fri, 13:00 - 13:45
    Track 3
  • A Hacker Guide To Deep-Learning Based Side Channel Attacks

    Elie Bursztein, Jean-Michel Picod
    Fri, 14:00 - 14:45
    Track 3
  • 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans

    Ang Cui, Richard Housley, Jatin Kataria
    Fri, 15:00 - 15:45
    Track 3
  • Surveillance Detection Scout - Your Lookout on Autopilot

    Truman Kain
    Fri, 16:00 - 16:20
    Track 3
  • Breaking The Back End! It Is Not Always A Bug. Sometimes, It Is Just Bad Design!

    Gregory Pickett
    Fri, 16:30 - 16:50
    Track 3
  • Saturday, August 10
  • Information Security in the Public Interest

    Bruce Schneier
    Sat, 10:00 - 10:45
    Track 3
  • Hacking Your Thoughts - Batman Forever meets Black Mirror

    Katherine Pratt
    Sat, 11:00 - 11:45
    Track 3
  • Why You Should Fear Your “mundane” Office Equipment

    Mario Rivas, Daniel Romero
    Sat, 12:00 - 12:45
    Track 3
  • Tag-side attacks against NFC

    Christopher Wade
    Sat, 13:00 - 13:45
    Track 3
  • Zero bugs found? Hold my Beer AFL! How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets

    Maksim Shudrak
    Sat, 14:00 - 14:45
    Track 3
  • State of DNS Rebinding - Attack & Prevention Techniques and the Singularity of Origin

    Gerald Doussot, Roger Meyer
    Sat, 15:00 - 15:45
    Track 3
  • Confessions of an Nespresso Money Mule: Free Stuff & Triangulation Fraud

    Nina Kollars
    Sat, 16:00 - 16:20
    Track 3
  • Go NULL Yourself or: How I Learned to Start Worrying While Getting Fined for Other’s Auto Infractions

    droogie
    Sat, 16:30 - 16:50
    Track 3
  • Sunday, August 11
  • Hacking WebAssembly Games with Binary Instrumentation

    Jack Baker
    Sun, 10:00 - 10:45
    Track 3
  • Exploiting Qualcomm WLAN and Modem Over The Air

    Xiling Gong, Peter Pi
    Sun, 11:00 - 11:45
    Track 3
  • HTTP Desync Attacks: Smashing into the Cell Next Door

    James Kettle
    Sun, 12:00 - 12:45
    Track 3
  • Owning The Cloud Through Server-Side Request Forgery

    Cody Brocious, Ben Sadeghipour
    Sun, 13:00 - 13:45
    Track 3
  • The Ether Wars: Exploits, counter-exploits and honeypots on Ethereum

    Daniel Luca, Bernhard Mueller
    Sun, 14:00 - 14:45
    Track 3