• Wednesday, July 31
  • WITH BIGDATA COMES BIG RESPONSIBILITY: PRACTICAL EXPLOITING OF MDX INJECTIONS

    Alexander Bolshev, Dmitry Chastuhin
    Wed, 10:15 - 11:15
    Roman 1 & 3
  • POWER ANALYSIS ATTACKS FOR CHEAPSKATES

    Colin O'Flynn
    Wed, 11:45 - 12:45
    Roman 1 & 3
  • FACT AND FICTION: DEFENDING YOUR MEDICAL DEVICES

    Jerome Radcliffe
    Wed, 14:15 - 15:15
    Roman 1 & 3
  • MALTEGO TUNGSTEN AS A COLLABORATIVE ATTACK PLATFORM

    Andrew MacPherson, Roelof Temmingh
    Wed, 15:30 - 16:30
    Roman 1 & 3
  • BINARYPIG - SCALABLE MALWARE ANALYTICS IN HADOOP

    Telvis Calhoun, Zachary Hanif, Jason Trost
    Wed, 17:00 - 18:00
    Roman 1 & 3
  • Thursday, August 1
  • ABUSING WEB APIS THROUGH SCRIPTED ANDROID APPLICATIONS

    Daniel Peck
    Thu, 10:15 - 10:45
    Roman 1 & 3
  • BIG DATA FOR WEB APPLICATION SECURITY

    Mike Arpaia, Kyle Barry
    Thu, 10:45 - 11:15
    Roman 1 & 3
  • DISSECTING CSRF ATTACKS & COUNTERMEASURES

    Sergey Shekyan, Mike Shema, Vaagn Toukharian
    Thu, 11:45 - 12:45
    Roman 1 & 3
  • ABOVE MY PAY GRADE: CYBER RESPONSE AT THE NATIONAL LEVEL

    Jason Healey
    Thu, 14:15 - 15:15
    Roman 1 & 3
  • VIRTUAL DEOBFUSCATOR - A DARPA CYBER FAST TRACK FUNDED EFFORT

    Jason Raber
    Thu, 15:30 - 16:30
    Roman 1 & 3
  • TERIDIAN SOC EXPLOITATION: EXPLORATION OF HARVARD ARCHITECTURE SMART GRID SYSTEMS

    Nathan Keltner, Josh Thomas
    Thu, 17:00 - 18:00
    Roman 1 & 3