• Wednesday, July 31
  • BLACKBERRYOS 10 FROM A SECURITY PERSPECTIVE

    Ralf-Philipp Weinmann
    Wed, 10:15 - 11:15
    Roman 4
  • SHATTERING ILLUSIONS IN LOCK-FREE WORLDS: COMPILER/HARDWARE BEHAVIORS IN OSES AND VMS

    Marc Blanchou
    Wed, 11:45 - 12:15
    Roman 4
  • PASSWORD HASHING: THE FUTURE IS NOW

    Jean-Philippe Aumasson
    Wed, 12:15 - 12:45
    Roman 4
  • PASS THE HASH AND OTHER CREDENTIAL THEFT AND REUSE: MITIGATING THE RISK OF LATERAL MOVEMENT AND PRIVILEGE ESCALATION

    Patrick Jungles, Mark Simos
    Wed, 14:15 - 15:15
    Roman 4
  • HOW TO GROW A TREE (TAINT-ENABLED REVERSE ENGINEERING ENVIRONMENT) FROM CBASS (CROSS-PLATFORM BINARY AUTOMATED SYMBOLIC-EXECUTION SYSTEM)

    James Just, Nathan Li, Xing Li, Loc Nguyen
    Wed, 15:30 - 16:30
    Roman 4
  • PREDICTING SUSCEPTIBILITY TO SOCIAL BOTS ON TWITTER

    Chris Sumner, Randall Wald
    Wed, 17:00 - 18:00
    Roman 4
  • Thursday, August 1
  • PASS-THE-HASH 2: THE ADMIN'S REVENGE

    Chris Campbell, Alva Duckwall
    Thu, 10:15 - 11:15
    Roman 4
  • ENERGY FRAUD AND ORCHESTRATED BLACKOUTS: ISSUES WITH WIRELESS METERING PROTOCOLS (WM-BUS)

    Cyrill Brunschwiler
    Thu, 11:45 - 12:45
    Roman 4
  • HOT KNIVES THROUGH BUTTER: BYPASSING AUTOMATED ANALYSIS SYSTEMS

    Zheng Bu, Abhishek Singh
    Thu, 14:15 - 15:15
    Roman 4
  • POST EXPLOITATION OPERATIONS WITH CLOUD SYNCHRONIZATION SERVICES

    Jacob Williams
    Thu, 15:30 - 16:30
    Roman 4
  • DEFENDING NETWORKS WITH INCOMPLETE INFORMATION: A MACHINE LEARNING APPROACH

    Alex Pinto
    Thu, 17:00 - 18:00
    Roman 4