• Wednesday, July 25
  • A STITCH IN TIME SAVES NINE: A CASE OF MULTIPLE OPERATING SYSTEM VULNERABILITY

    Rafal Wojtczuk
    Wed, 10:15 - 11:15
    Palace II - Breaking Things
  • THE DEFENSE RESTS: AUTOMATION AND APIS FOR IMPROVING SECURITY

    David Mortman
    Wed, 11:45 - 12:45
    Palace II - Defense
  • CONTROL-ALT-HACK(TM): WHITE HAT HACKING FOR FUN AND PROFIT (A COMPUTER SECURITY CARD GAME)

    Tamara Denning, Tadayoshi Kohno, Adam Shostack
    Wed, 14:15 - 15:15
    Palace II - Defense
  • INTRUSION DETECTION ALONG THE KILL CHAIN: WHY YOUR DETECTION SYSTEM SUCKS AND WHAT TO DO ABOUT IT

    John Flynn
    Wed, 15:30 - 16:30
    Palace II - Defense
  • EXPLOIT MITIGATION IMPROVEMENTS IN WIN 8

    Ken Johnson, Matt Miller
    Wed, 17:00 - 18:00
    Palace II - Defense
  • Thursday, July 26
  • THE SUBWAY LINE 8 - EXPLOITATION OF WINDOWS 8 METRO STYLE APPS

    Ming-chieh Pan, Sung-Ting Tsai
    Thu, 10:15 - 11:15
    Palace II - 92.2% Market Share
  • WE HAVE YOU BY THE GADGETS

    Toby Kohlenberg, Mickey Shkatov
    Thu, 11:45 - 12:45
    Palace II - 92.2% Market Share
  • EXCHANGING DEMANDS

    Peter Hannay
    Thu, 14:15 - 15:15
    Palace II - 92.2% Market Share
  • WINDOWS PHONE 7 INTERNALS AND EXPLOITABILITY

    Tsukasa Oi
    Thu, 15:30 - 16:30
    Palace II - 92.2% Market Share
  • EASY LOCAL WINDOWS KERNEL EXPLOITATION

    Cesar Cerrudo
    Thu, 17:00 - 18:00
    Palace II - 92.2% Market Share