• Friday, August 9
  • Duplicating Restricted Mechanical Keys

    Bill Graydon, Robert Graydon
    Fri, 10:00 - 10:45
    Track 4
  • Evil eBPF In-Depth: Practical Abuses of an In-Kernel Bytecode Runtime

    Jeff Dileo
    Fri, 11:00 - 11:45
    Track 4
  • API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web

    Joshua Maddux
    Fri, 12:00 - 12:45
    Track 4
  • More Keys Than A Piano: Finding Secrets In Publicly Exposed Ebs Volumes

    Ben Morris
    Fri, 13:00 - 13:45
    Track 4
  • Practical Key Search Attacks Against Modern Symmetric Ciphers

    Dan Crowley, Daniel Pagan
    Fri, 14:00 - 14:45
    Track 4
  • Relaying Credentials Has Never Been Easier: How to Easily Bypass the Latest NTLM Relay Mitigations

    Marina Simakov, Yaron Zinar
    Fri, 15:00 - 15:45
    Track 4
  • The JOP ROCKET: A Supremely Wicked Tool for JOP Gadget Discovery, or What to Do If ROP Is Too Easy

    Dr. Bramwell Brizendine, Dr. Joshua Stroschien
    Fri, 16:00 - 16:20
    Track 4
  • Re: What's up Johnny? – Covert Content Attacks on Email End-to-End Encryption

    Jens Müller
    Fri, 16:30 - 16:50
    Track 4
  • Saturday, August 10
  • EDR Is Coming; Hide Yo Sh!t

    Michael Leibowitz, Topher Timzen
    Sat, 10:00 - 10:45
    Track 4
  • Meticulously Modern Mobile Manipulations

    Leon Jacobs
    Sat, 11:00 - 11:45
    Track 4
  • Zombie Ant Farm: Practical Tips for Playing Hide and Seek with Linux EDRs

    Dimitry Snezhkov
    Sat, 12:00 - 12:45
    Track 4
  • SSO Wars: The Token Menace

    Oleksandr Mirosh, Alvaro Muñoz
    Sat, 13:00 - 13:45
    Track 4
  • Next Generation Process Emulation with Binee

    Kyle Gwinnup, John Holowczak
    Sat, 14:00 - 14:45
    Track 4
  • .NET Malware Threats: Internals And Reversing

    Alexandre Borges
    Sat, 15:00 - 15:45
    Track 4
  • Vacuum Cleaning Security—Pinky and the Brain Edition

    jiska, Fabian Ullrich
    Sat, 16:00 - 16:20
    Track 4
  • Apache Solr Injection

    Michael Stepankin
    Sat, 16:30 - 16:50
    Track 4
  • Sunday, August 11
  • Your Secret Files Are Mine: Bug Finding And Exploit Techniques On File Transfer App Of All Top Android Vendors

    Huiming Liu, Xiangqian Zhang
    Sun, 10:00 - 10:45
    Track 4
  • Say Cheese - How I Ransomwared Your DSLR Camera

    Eyal Itkin
    Sun, 11:00 - 11:45
    Track 4
  • Help Me, Vulnerabilities. You're My Only Hope

    Jacob Baines
    Sun, 12:00 - 12:45
    Track 4
  • Want Strong Isolation? Just Reset Your Processor

    Anish Athalye
    Sun, 13:00 - 13:45
    Track 4
  • Contests Awards Ceremony

     
    Sun, 14:00 - 15:30
    Track 4