• Thursday, August 1
  • Hacker Law School

    Marcia Hofmann, Jim Rennie
    Thu, 10:00 - 11:50
    Track 3 - Track 3
  • Pentesters Toolkit

    Anch
    Thu, 12:00 - 12:50
    Track 3 - Track 3
  • Oil & Gas Infosec 101

    Aaron Bayles
    Thu, 13:00 - 13:50
    Track 3 - Track 3
  • Meet Pentoo, the Longest Running Pen-testing Linux Distro

    ZeroChaos
    Thu, 14:00 - 14:50
    Track 3 - Track 3
  • Wireless Penetration Testing 101 & Wireless Contesting

    DaKahuna, Rick Mellendick
    Thu, 15:00 - 15:50
    Track 3 - Track 3
  • Friday, August 2
  • Adventures in Automotive Networks and Control Units

    Charlie Miller, Christopher Valasek
    Fri, 10:00 - 10:45
    Track 3 - Track 3
  • Hacking Driverless Vehicles

    Zoz
    Fri, 11:00 - 11:45
    Track 3 - Track 3
  • 10000 Yen into the Sea

    Flipper
    Fri, 12:00 - 12:45
    Track 3 - Track 3
  • Business logic flaws in mobile operators services

    Bogdan Alecu
    Fri, 13:00 - 13:45
    Track 3 - Track 3
  • Meet the VCs

    Eileen Burbidge, Ping Li, Matt Ocko, Phil Paul
    Fri, 14:00 - 14:45
    Track 3 - Track 3
  • The ACLU Presents: NSA Surveillance and More

    Alex Abdo, Kade Crockford, Catherine Crump, Nicole Ozer, Christopher Soghoian
    Fri, 15:00 - 15:45
    Track 3 - Track 3
  • The Government and UFOs: A Historical Analysis by Richard Thieme

    Richard Thieme
    Fri, 16:00 - 16:45
    Track 3 - Track 3
  • How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers

    Michael Schrenk
    Fri, 17:00 - 17:45
    Track 3 - Track 3
  • Saturday, August 3
  • Predicting Susceptibility to Social Bots on Twitter

    Chris Sumner, Randall Wald
    Sat, 10:00 - 10:45
    Track 3 - Track 3
  • Fear the Evil FOCA: IPv6 attacks in Internet connections

    Chema Alonso
    Sat, 11:00 - 11:45
    Track 3 - Track 3
  • Legal Aspects of Full Spectrum Computer Network (Active) Defense

    Robert Clark
    Sat, 12:00 - 12:45
    Track 3 - Track 3
  • We are Legion: Pentesting with an Army of Low-power Low-cost Devices

    Phil Polstra
    Sat, 13:00 - 13:45
    Track 3 - Track 3
  • Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices

    Wesley McGrew
    Sat, 14:00 - 14:45
    Track 3 - Track 3
  • PowerPreter: Post Exploitation Like a Boss

    Nikhil Mittal
    Sat, 16:00 - 16:45
    Track 3 - Track 3
  • DNS May Be Hazardous to Your Health

    Robert Stucke
    Sat, 17:00 - 17:45
    Track 3 - Track 3
  • Sunday, August 4
  • Exploiting Music Streaming with JavaScript

    Franz Payer
    Sun, 10:00 - 10:45
    Track 3 - Track 3
  • Java Every-Days: Exploiting Software Running on 3 Billion Devices

    Brian Gorenc, Jasiel Spelman
    Sun, 11:00 - 11:45
    Track 3 - Track 3
  • HiveMind: Distributed File Storage Using JavaScript Botnets

    Sean Malone
    Sun, 12:00 - 12:45
    Track 3 - Track 3
  • Defending Networks with Incomplete Information: A Machine Learning Approach

    Alex Pinto
    Sun, 13:00 - 13:45
    Track 3 - Track 3
  • Blucat: Netcat For Bluetooth

    Joseph Paul Cohen
    Sun, 14:00 - 14:45
    Track 3 - Track 3
  • BYOD PEAP Show

    Josh Yavor
    Sun, 15:00 - 15:45
    Track 3 - Track 3
  • The Bluetooth Device Database

    Ryan Holeman
    Sun, 16:00 - 16:20
    Track 3 - Track 3