• Wednesday, July 28
  • Attacking Kerberos Deployments

    Rachel Engel, Brad Hill, Scott Stender
    Wed, 10:00 - 11:00
    Milano 5+6+7+8 - OS Wars
  • Understanding the Windows SMB NTLM Weak Nonce Vulnerability

    Agustin Azubel, Hernan Ochoa
    Wed, 11:15 - 12:30
    Milano 5+6+7+8 - OS Wars
  • Adventures in Limited User Post Exploitation

    Tim Elrod, Nathan Keltner
    Wed, 13:45 - 15:00
    Milano 5+6+7+8 - OS Wars
  • Standing on the Shoulders of the Blue Monster: Hardening Windows Applications

    olle b
    Wed, 15:15 - 16:30
    Milano 5+6+7+8 - OS Wars
  • Ushering in the Post-GRC World: Applied Threat Modeling

    Alex Hutton, Allison Miller
    Wed, 16:45 - 18:00
    Milano 5+6+7+8 - OS Wars
  • Thursday, July 29
  • New Threats to Privacy: From TIA to Google

    Moxie Marlinspike
    Thu, 10:00 - 11:00
    Milano 5+6+7+8 - Privacy
  • Unauthorized Internet Wiretapping: Exploiting Lawful Intercept

    Tom Cross
    Thu, 11:15 - 12:30
    Milano 5+6+7+8 - Privacy
  • The DMCA & ACTA vs. Academic & Professional Research: How Misuse of this Intellectual Property Legislation Chills Research, Disclosure and Innovation

    Tiffany Rad
    Thu, 13:45 - 15:00
    Milano 5+6+7+8 - Privacy
  • Attacking Phone Privacy

    Karsten Nohl
    Thu, 15:15 - 16:30
    Milano 5+6+7+8 - Privacy
  • Carmen Sandiego is On the Run!

    Don A. Bailey, Nick DePetrillo
    Thu, 16:45 - 18:00
    Milano 5+6+7+8 - Privacy