• Wednesday, July 25
  • HOW THE ANALYSIS OF ELECTRICAL CURRENT CONSUMPTION OF EMBEDDED SYSTEMS COULD LEAD TO CODE REVERSING?

    Julien Moinard, Yann Allain
    Wed, 11:45 - 12:45
    Augustus V+VI - Lower Layers
  • LOOKING INTO THE EYE OF THE METER

    Don Weber
    Wed, 14:15 - 15:15
    Augustus V+VI - Lower Layers
  • WINDOWS 8 HEAP INTERNALS

    Tarjei Mandt, Christopher Valasek
    Wed, 15:30 - 16:30
    Augustus V+VI - Lower Layers
  • GHOST IS IN THE AIR(TRAFFIC)

    Javier Galbally
    Wed, 17:00 - 18:00
    Augustus V+VI - Lower Layers
  • Thursday, July 26
  • A SCIENTIFIC (BUT NON ACADEMIC) STUDY OF HOW MALWARE EMPLOYS ANTI-DEBUGGING, ANTI-DISASSEMBLY AND ANTI-VIRTUALIZATION TECHNOLOGIES

    Rodrigo Rubira Branco
    Thu, 10:15 - 11:15
    Augustus V+VI - Mobile
  • DE MYSTERIIS DOM JOBSIVS: MAC EFI ROOTKITS

    Loukas K
    Thu, 11:45 - 12:45
    Augustus V+VI - Mobile
  • DEX EDUCATION: PRACTICING SAFE DEX

    Tim Strazzere
    Thu, 14:15 - 15:15
    Augustus V+VI - Malware
  • HARDWARE BACKDOORING IS PRACTICAL

    Jonathan Brossard
    Thu, 15:30 - 16:30
    Augustus V+VI - Malware
  • FLOWERS FOR AUTOMATED MALWARE ANALYSIS

    Paul Royal, Chengyu Song
    Thu, 17:00 - 18:00
    Augustus V+VI - Malware