• Wednesday, July 31
  • KEYNOTE - DAY ONE

    General Keith B. Alexander
    Wed, 09:00 - 10:00
    Roman 2
  • MAINFRAMES: THE PAST WILL COME BACK TO HAUNT YOU

    Phil Young
    Wed, 10:15 - 11:15
    Roman 2
  • BLACK-BOX ASSESSMENT OF PSEUDORANDOM ALGORITHMS

    Christopher Abad, Gabriel Acevedo, Derek Soeder
    Wed, 11:45 - 12:45
    Roman 2
  • END-TO-END ANALYSIS OF A DOMAIN GENERATING ALGORITHM MALWARE FAMILY

    Jason Geffner
    Wed, 14:15 - 15:15
    Roman 2
  • JAVASCRIPT STATIC SECURITY ANALYSIS MADE EASY WITH JSPRIME

    Nishant Das Patnaik, Sarathi Sabyasachi Sahoo
    Wed, 15:30 - 16:30
    Roman 2
  • THE WEB IS VULNERABLE: XSS DEFENSE ON THE BATTLEFRONT

    Ryan Barnett, Greg Wroblewski
    Wed, 17:00 - 17:30
    Roman 2
  • MALICIOUS FILE FOR EXPLOITING FORENSIC SOFTWARE

    Takahiro Haruyama, Hiroshi Suzuki
    Wed, 17:30 - 18:00
    Roman 2
  • Thursday, August 1
  • KEYNOTE - TAKE RISK, DON’T FAIL

    Brian Muirhead
    Thu, 09:00 - 10:00
    Roman 2
  • CMX: IEEE CLEAN FILE METADATA EXCHANGE

    Mark Kennedy, Igor Muttik
    Thu, 10:15 - 10:45
    Roman 2
  • MOBILE MALWARE: WHY THE TRADITIONAL AV PARADIGM IS DOOMED AND HOW TO USE PHYSICS TO DETECT UNDESIRABLE ROUTINES

    Markus Jakobsson, Guy Stewart
    Thu, 10:45 - 11:15
    Roman 2
  • BOCHSPWN: IDENTIFYING 0-DAYS VIA SYSTEM-WIDE MEMORY ACCESS PATTERN ANALYSIS

    Gynvael Coldwind, Mateusz Jurczyk
    Thu, 11:45 - 12:45
    Roman 2
  • USING ONLINE ACTIVITY AS DIGITAL FINGERPRINTS TO CREATE A BETTER SPEAR PHISHER

    Ulisses Albuquerque, Joaquim Espinhara
    Thu, 14:15 - 15:15
    Roman 2
  • CREEPYDOL: CHEAP, DISTRIBUTED STALKING

    Brendan O'Connor
    Thu, 15:30 - 16:30
    Roman 2
  • OPTIROP: HUNTING FOR ROP GADGETS IN STYLE

    Nguyen Anh Quynh
    Thu, 17:00 - 18:00
    Roman 2