• Wednesday, July 25
  • ADVANCED ARM EXPLOITATION

    Stephen Lawler, Stephen Ridley
    Wed, 10:15 - 11:15
    Palace I - Mobile
  • SCALING UP BASEBAND ATTACKS: MORE (UNEXPECTED) ATTACK SURFACE

    Ralf-Philipp Weinmann
    Wed, 11:45 - 12:45
    Palace I - Mobile
  • DON'T STAND SO CLOSE TO ME: AN ANALYSIS OF THE NFC ATTACK SURFACE

    Charlie Miller
    Wed, 14:15 - 14:35
    Palace I - Mobile
  • PROBING MOBILE OPERATOR NETWORKS

    Collin Mulliner
    Wed, 15:30 - 16:30
    Palace I - Mobile
  • ADVENTURES IN BOUNCERLAND

    Nicholas J. Percoco, Sean Schulte
    Wed, 17:00 - 18:00
    Palace I - Mobile
  • Thursday, July 26
  • CATCHING INSIDER DATA THEFT WITH STOCHASTIC FORENSICS

    Jonathan Grier
    Thu, 10:15 - 11:15
    Palace I - Enterprise Intrigue
  • FIND ME IN YOUR DATABASE: AN EXAMINATION OF INDEX SECURITY

    David Litchfield
    Thu, 11:45 - 12:45
    Palace I - Enterprise Intrigue
  • PASSIVE BLUETOOTH MONITORING IN SCAPY

    Ryan Holeman
    Thu, 14:15 - 14:35
    Palace I - Enterprise Intrigue
  • SYNFUL DECEIT, STATEFUL SUBTERFUGE

    Chris Patten, Tom Steele
    Thu, 14:35 - 14:55
    Palace I - Enterprise Intrigue
  • STAMP OUT HASH CORRUPTION, CRACK ALL THE THINGS

    Jonathan Claudius, Ryan Reynolds
    Thu, 14:55 - 15:15
    Palace I - Enterprise Intrigue
  • CLONEWISE - AUTOMATED PACKAGE CLONE DETECTION

    Silvio Cesare
    Thu, 15:30 - 16:30
    Palace I - Enterprise Intrigue
  • SSRF VS. BUSINESS CRITICAL APPLICATIONS

    Dmitry Chastuhin, Alexander Polyakov
    Thu, 17:00 - 18:00
    Palace I - Enterprise Intrigue