• Wednesday, July 25
  • FILE DISINFECTION FRAMEWORK: STRIKING BACK AT POLYMORPHIC VIRUSES

    Tomislav Pericin, Mario Vuksan
    Wed, 10:15 - 11:15
    Romans I-IV - Gnarly Problems
  • CONFESSIONS OF A WAF DEVELOPER: PROTOCOL-LEVEL EVASION OF WEB APPLICATION FIREWALLS

    Ivan Ristic
    Wed, 11:45 - 12:45
    Romans I-IV - Gnarly Problems
  • TORTURING OPENSSL

    Valeria Bertacco
    Wed, 14:15 - 15:15
    Romans I-IV - Gnarly Problems
  • WEB TRACKING FOR YOU

    Gregory Fleischer
    Wed, 15:30 - 16:30
    Romans I-IV - Gnarly Problems
  • HERE BE BACKDOORS: A JOURNEY INTO THE SECRETS OF INDUSTRIAL FIRMWARE

    Ruben Santamarta
    Wed, 17:00 - 18:00
    Romans I-IV - Gnarly Problems
  • Thursday, July 26
  • STILL PASSING THE HASH 15 YEARS LATER? USING THE KEYS TO THE KINGDOM TO ACCESS ALL YOUR DATA

    Christopher Campbell, Alva Duckwall
    Thu, 10:15 - 11:15
    Romans I-IV - Mass Effect
  • RECENT JAVA EXPLOITATION TRENDS AND MALWARE

    Jeongwook Oh
    Thu, 11:45 - 12:45
    Romans I-IV - Mass Effect
  • DIGGING DEEP INTO THE FLASH SANDBOXES

    Paul Sabanal, Mark Yason
    Thu, 14:15 - 15:15
    Romans I-IV - Mass Effect
  • SQL INJECTION TO MIPS OVERFLOWS: ROOTING SOHO ROUTERS

    Zachary Cutlip
    Thu, 15:30 - 16:30
    Romans I-IV - Mass Effect
  • HOOKIN' AIN'T EASY: BEEF INJECTION WITH MITM

    Ryan Linn, Steve Ocepek
    Thu, 17:00 - 18:00
    Romans I-IV - Mass Effect