• Wednesday, July 31
  • COMBATING THE INSIDER THREAT AT THE FBI: REAL WORLD LESSONS LEARNED

    Patrick Reidy
    Wed, 10:15 - 11:15
    Augustus 5 & 6
  • JUST-IN-TIME CODE REUSE: THE MORE THINGS CHANGE, THE MORE THEY STAY THE SAME

    Lucas Davi, Kevin Snow
    Wed, 11:45 - 12:15
    Augustus 5 & 6
  • BIOS SECURITY

    John Butterworth, Corey Kallenberg, Xeno Kovah
    Wed, 14:15 - 15:15
    Augustus 5 & 6
  • TOR... ALL-THE-THINGS!

    Jason Geffner
    Wed, 15:30 - 16:00
    Augustus 5 & 6
  • TRUNCATING TLS CONNECTIONS TO VIOLATE BELIEFS IN WEB APPLICATIONS

    Alfredo Pironti, Ben Smyth
    Wed, 16:00 - 16:30
    Augustus 5 & 6
  • ROOTING SIM CARDS

    Karsten Nohl
    Wed, 17:00 - 18:00
    Augustus 5 & 6
  • Thursday, August 1
  • FULLY ARBITRARY 802.3 PACKET INJECTION: MAXIMIZING THE ETHERNET ATTACK SURFACE

    Andrea Barisani, Daniele Bianco
    Thu, 10:15 - 11:15
    Augustus 5 & 6
  • REVEALING EMBEDDED FINGERPRINTS: DERIVING INTELLIGENCE FROM USB STACK INTERACTIONS

    Andy Davis
    Thu, 11:45 - 12:45
    Augustus 5 & 6
  • FUNDERBOLT: ADVENTURES IN THUNDERBOLT DMA ATTACKS

    Russ Sevinsky
    Thu, 14:15 - 15:15
    Augustus 5 & 6
  • RFID HACKING: LIVE FREE OR RFID HARD

    Francis Brown
    Thu, 15:30 - 16:30
    Augustus 5 & 6
  • HOME INVASION V2.0 - ATTACKING NETWORK-CONTROLLED HARDWARE

    David Bryan, Dan Crowley, Jennifer Savage
    Thu, 17:00 - 18:00
    Augustus 5 & 6