• 10:00
  • The Cavalry Isn't Coming: Starting the Revolution to Fsck it All!

    Joshua Corman, Nicholas J. Percoco
    Sun, 10:00 - 10:45
    Track 1 - Track 1
  • gitDigger: Creating useful wordlists from public GitHub repositories

    Jaime Filson, Rob Fuller
    Sun, 10:00 - 10:20
    Track 2 - Track 2
  • Exploiting Music Streaming with JavaScript

    Franz Payer
    Sun, 10:00 - 10:45
    Track 3 - Track 3
  • Defense by numbers: Making problems for script kiddies and scanner monkeys

    Chris John Riley
    Sun, 10:00 - 10:45
    Track 4 - Track 4
  • 10:30
  • Made Open: Hacking Capitalism

    Todd Bonnewell
    Sun, 10:30 - 11:20
    Track 2 - Track 2
  • 11:00
  • The Dark Arts of OSINT

    Noah Schiffman, SkyDog
    Sun, 11:00 - 11:45
    Track 1 - Track 1
  • Java Every-Days: Exploiting Software Running on 3 Billion Devices

    Brian Gorenc, Jasiel Spelman
    Sun, 11:00 - 11:45
    Track 3 - Track 3
  • Resting on Your Laurels will get you Pwned: Effectively Code Reviewing REST Applications to avoid getting powned

    Dinis Cruz, Abraham Kang
    Sun, 11:00 - 11:45
    Track 4 - Track 4
  • LAZZORS! PEW! PEW!

    Acr0nym, Johan Hybinette
    Sun, 11:00 - 11:50
    SkyTalks - SkyTalks
  • 11:30
  • The dawn of Web 3.0: website mapping and vulnerability scanning in 3D, just like you saw in the movies

    Alejandro Caceres, Teal Rogers
    Sun, 11:30 - 11:50
    Track 2 - Track 2
  • 12:00
  • EMET 4.0 PKI Mitigation

    Neil Sikka
    Sun, 12:00 - 12:45
    Track 1 - Track 1
  • Combatting Mac OSX/iOS Malware with Data Visualization

    Remy Baumgarten
    Sun, 12:00 - 12:20
    Track 2 - Track 2
  • HiveMind: Distributed File Storage Using JavaScript Botnets

    Sean Malone
    Sun, 12:00 - 12:45
    Track 3 - Track 3
  • This presentation will self-destruct in 45 minutes: A forensic deep dive into self-destructing message apps

    Andrea London, Kyle O'Meara
    Sun, 12:00 - 12:45
    Track 4 - Track 4
  • Strange interactions in personal data: Brokers and the CFAA

    Christie Dudley
    Sun, 12:00 - 12:50
    SkyTalks - SkyTalks
  • 12:30
  • A Thorny Piece Of Malware (And Me): The Nastiness of SEH, VFTables & Multi-Threading

    Marion Marschalek
    Sun, 12:30 - 12:50
    Track 2 - Track 2
  • 13:00
  • Stepping P3wns: Adventures in full spectrum embedded exploitation (and defense!)

    Michael Costello, Ang Cui
    Sun, 13:00 - 13:45
    Track 1 - Track 1
  • Transcending Cloud Limitations by Obtaining Inner Piece

    Zak Blacher
    Sun, 13:00 - 13:20
    Track 2 - Track 2
  • Defending Networks with Incomplete Information: A Machine Learning Approach

    Alex Pinto
    Sun, 13:00 - 13:45
    Track 3 - Track 3
  • Fast Forensics Using Simple Statistics and Cool Tools

    John Ortiz
    Sun, 13:00 - 13:45
    Track 4 - Track 4
  • The Continued Rise of Idiocracy: CCSS, PBI and other education acronyms that nobody understands

    0nlychick
    Sun, 13:00 - 13:50
    SkyTalks - SkyTalks
  • 13:30
  • Utilizing Popular Websites for Malicious Purposes Using RDI

    Daniel Chechik, Anat Davidi
    Sun, 13:30 - 13:50
    Track 2 - Track 2
  • 14:00
  • EDS: Exploitation Detection System

    Amr Thabet
    Sun, 14:00 - 14:45
    Track 1 - Track 1
  • Open Public Sensors, Trend Monitoring and Data Fusion

    Daniel Burroughs
    Sun, 14:00 - 14:20
    Track 2 - Track 2
  • Blucat: Netcat For Bluetooth

    Joseph Paul Cohen
    Sun, 14:00 - 14:45
    Track 3 - Track 3
  • Forensic Fails - Shift + Delete won't help you here

    Michael Perklin, Eric Robi
    Sun, 14:00 - 14:45
    Track 4 - Track 4
  • Network Survival WCS

    James Costello
    Sun, 14:00 - 14:50
    SkyTalks - SkyTalks
  • 14:30
  • Collaborative Penetration Testing With Lair

    Dan Kottmann, Tom Steele
    Sun, 14:30 - 14:50
    Track 2 - Track 2
  • 15:00
  • Conducting massive attacks with open source distributed computing

    Alejandro Caceres
    Sun, 15:00 - 15:45
    Track 1 - Track 1
  • PowerPwning: Post-Exploiting By Overpowering PowerShell

    Joe Bialek
    Sun, 15:00 - 15:20
    Track 2 - Track 2
  • BYOD PEAP Show

    Josh Yavor
    Sun, 15:00 - 15:45
    Track 3 - Track 3
  • Let's screw with nmap

    Gregory Pickett
    Sun, 15:00 - 15:45
    Track 4 - Track 4
  • Owning Management with Standards

    Tim Krabec
    Sun, 15:00 - 15:50
    SkyTalks - SkyTalks
  • 15:30
  • Evolving Exploits Through Genetic Algorithms

    soen
    Sun, 15:30 - 15:50
    Track 2 - Track 2
  • 16:00
  • Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions

    Andy Davis
    Sun, 16:00 - 16:45
    Track 1 - Track 1
  • The Bluetooth Device Database

    Ryan Holeman
    Sun, 16:00 - 16:20
    Track 3 - Track 3
  • C.R.E.A.M. Cache Rules Evidently Ambiguous, Misunderstood

    Jacob Thompson
    Sun, 16:00 - 16:45
    Track 4 - Track 4
  • Challenges being a criminal defense digital forensics expert

    The Public
    Sun, 16:00 - 16:50
    SkyTalks - SkyTalks
  • 17:00
  • Closing Ceremonies

     
    Sun, 17:00 - 19:00
    Track 2