• 0
  • 0wn the Con

    The Shmoo Group
    Sat, 15:00 - 15:50
    Build It Room - Build It
  • A
  • A Critical Review of Spatial Analysis

    David Giametta, Andrew Potter
    Sat, 12:00 - 12:50
    Belay It room - Belay it
  • ADD -- Complicating Memory Forensics Through Memory Disarray

    Alissa Torres, Jake Williams
    Sat, 17:00 - 17:50
    Build It Room - Build It
  • Android Forensics & Security Testing

    Jared Ondricek
    Fri, 19:30 - 20:20
    Georgetown East - Trainer Exchange
  • Android Forensics & Security Testing (repeat)

    Jared Ondricek
    Sat, 12:00 - 12:50
    Georgetown West - Trainer Exchange
  • An Introduction to Cellular Security

    Joshua Franklin
    Fri, 17:30 - 18:20
    Georgetown East - Trainer Exchange
  • An Open and Affordable USB Man in the Middle Device

    Dominic Spill
    Sun, 10:00 - 10:50
    Build It Room - Build It
  • Another Log to Analyze – Utilizing DNS to Discover Malware in Your Network

    Nathan Magniez
    Fri, 20:50 - 21:10
    Build It Room - Fire Talks
  • Arms Race: The Story of (In)-Secure Bootloaders

    Lee Harrison, Kang Li
    Sat, 12:00 - 12:50
    Bring It On room - Bring it On
  • Attacker Ghost Stories: Mostly Free Defenses That Give Attackers Nightmares

    Rob Fuller
    Fri, 15:30 - 15:55
    Main Room - One Track Mind
  • AV Evasion With the Veil Framework

    Will Schroeder, Christopher Truncer, Mike Wright
    Sat, 16:00 - 16:50
    Build It Room - Build It
  • B
  • Building An Information Security Awareness Program From Scratch

    Bill Gardner
    Sat, 19:00 - 19:20
    Build It Room - Fire Talks
  • C
  • CCTV: Setup, Attack Vectors, and Laws

    Spencer Brooks, Joshua Schroeder
    Fri, 17:00 - 17:25
    Main Room - One Track Mind
  • Closing Remarks

    Bruce Potter
    Sun, 14:30 - 15:20
    Main Room - One Track Mind
  • Controlling USB Flash Drive Controllers: Expose of Hidden Features

    Richard Harman
    Sat, 14:00 - 14:50
    Build It Room - Build It
  • Crossing the Streams with State Machines in IDS Signature Languages

    Michael Rash
    Fri, 20:30 - 20:50
    Build It Room - Fire Talks
  • D
  • Data Whales and Troll Tears: Beat the Odds in InfoSec

    Allison Miller, Davi Ottenheimer
    Sat, 14:00 - 14:50
    Belay It room - Belay it
  • Dissipation of Hackers in the Enterprise

    Weasel
    Fri, 18:00 - 18:25
    Main Room - One Track Mind
  • E
  • Exploits 2: Exploitation in the Windows Environment

    Corey Kallenberg
    Sat, 11:00 - 11:50
    Georgetown West - Trainer Exchange
  • Eyes on IZON: Surveilling IP Camera Security

    Mark Stanislav
    Fri, 19:50 - 20:10
    Build It Room - Fire Talks
  • F
  • Flow Analysis & Network Hunting

    Ben Actis
    Sat, 15:00 - 15:50
    Georgetown West - Trainer Exchange
  • G
  • Genuinely "Trusted Computing:" Free and Open Hardware Security Modules

    Ryan Lackey
    Sat, 10:00 - 10:50
    Build It Room - Build It
  • Get Out of Jail Free Cards? What Aviation Can Teach Us About Information Sharing

    Bob Stratton
    Fri, 20:10 - 20:30
    Build It Room - Fire Talks
  • H
  • Having Your Cake and Eating It Too: FOIA, Surveillance, and Privacy

    Michael Schearer
    Sat, 18:40 - 19:00
    Build It Room - Fire Talks
  • How Hackers for Charity (Possibly) Saved Me a Lot of Money

    Branden Miller, Emily Miller
    Fri, 16:30 - 16:55
    Main Room - One Track Mind
  • "
  • "How I Met Your Mother" or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age

    Benjamin Gatti
    Sun, 10:00 - 10:50
    Belay It room - Belay it
  • H
  • How to Train your Snapdragon: Exploring Power Frameworks on Android

    Josh Thomas
    Sat, 16:00 - 16:50
    Bring It On room - Bring it On
  • I
  • I Found a Thing and You Can (Should) Too: ISP's Unauthenticated SOAP Service = Find (Almost) All The Things!

    Nicholas Popovich
    Sat, 11:00 - 11:50
    Bring It On room - Bring it On
  • Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration

    Xeno Kovah
    Sat, 11:00 - 11:50
    Georgetown East - Trainer Exchange
  • Introducing DARPA's Cyber Grand Challenge

    Mike Walker
    Sat, 10:00 - 10:50
    Belay It room - Belay it
  • Introducing idb - Simplified Blackbox iOS App Pentesting

    Daniel A. Mayer
    Sun, 12:00 - 12:20
    Build It Room - Build It
  • Introduction to ARM

    Gananand Kini
    Sat, 14:00 - 14:50
    Georgetown West - Trainer Exchange
  • Introduction To Reverse Engineering Software

    Frank Poz
    Fri, 16:30 - 17:20
    Georgetown East - Trainer Exchange
  • Introduction To Reverse Engineering Software (repeat)

    Frank Poz
    Sat, 10:00 - 10:50
    Georgetown East - Trainer Exchange
  • Introduction To Software Exploits

    Corey Kallenberg
    Sat, 10:00 - 10:50
    Georgetown West - Trainer Exchange
  • Introduction To Vulnerability Assessment

    Jose Cintron
    Sat, 18:00 - 18:50
    Georgetown East - Trainer Exchange
  • Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration

    Xeno Kovah
    Fri, 15:30 - 16:20
    Georgetown East - Trainer Exchange
  • Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration (repeat)

    Xeno Kovah
    Sat, 16:00 - 16:50
    Georgetown East - Trainer Exchange
  • L
  • Large Scale Network and Application Scanning

    Alejandro Caceres, Rob Graham, Paul McMillan, Bruce Potter, Dan Tentler
    Sun, 13:30 - 14:20
    Main Room - One Track Mind
  • Lessons-Learned in Designing a Training Course for Professionals

    Alfred Ouyang
    Sat, 18:00 - 18:50
    Georgetown West - Trainer Exchange
  • LTE vs. Darwin

    Brian Butterly, Hendrik Schmidt
    Sat, 17:00 - 17:50
    Bring It On room - Bring it On
  • M
  • Malicious Online Activities Related to the 2012 U.S. General Election

    Joshua Franklin, Matthew Jablonski, Dr. Damon McCoy, Robert Tarlecki
    Sun, 10:00 - 10:50
    Bring It On room - Bring it On
  • Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms

    Pablo San Emeterio, Jaime Sanchez
    Sat, 11:00 - 11:50
    Build It Room - Build It
  • Malware Dynamic Analysis

    Veronica Kovah
    Sat, 15:00 - 15:50
    Georgetown East - Trainer Exchange
  • O
  • Offensive, Defensive, and Forensic Techniques for Determining Web User Identity

    Zachary Zebrowski
    Sat, 17:00 - 17:50
    Georgetown West - Trainer Exchange
  • Opening Remarks, Rumblings, and Rants

    Bruce Potter
    Fri, 14:30 - 15:25
    Main Room - One Track Mind
  • Operationalizing Threat Information Sharing: Beyond Policies and Platitudes

    Sean Barnum, Aharon Chernin
    Sat, 15:00 - 15:50
    Belay It room - Belay it
  • P
  • Pcap Analysis & Network Hunting

    Reid Gilman
    Sat, 16:00 - 16:50
    Georgetown West - Trainer Exchange
  • Practical Applications of Data Science in Detection

    Mike Sconzo, Brian Wylie
    Sun, 12:00 - 12:50
    Belay It room - Belay it
  • Privacy Online: What Now?

    Ian Goldberg
    Fri, 18:30 - 19:20
    Main Room - One Track Mind
  • R
  • Raising Costs for Your Attackers Instead of Your CFO

    Aaron Beuhring, Kyle Salous
    Sun, 11:00 - 11:50
    Belay It room - Belay it
  • Reverse Engineering Malware

    Frank Poz
    Sat, 17:00 - 17:50
    Georgetown East - Trainer Exchange
  • Rootkits: What they are, and how to find them

    Xeno Kovah
    Sat, 14:00 - 14:50
    Georgetown East - Trainer Exchange
  • S
  • SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography

    Daniel J. Bernstein, Tanja Lange
    Sat, 12:00 - 12:50
    Build It Room - Build It
  • Security Analytics: Less Hype, More Data

    Aaron Gee-Clough
    Fri, 17:30 - 17:55
    Main Room - One Track Mind
  • Syncing Mentorship Between Winners And Beginners

    Liz Dahlstrom, Tarah Wheeler Van Vlack
    Sat, 14:00 - 14:50
    Bring It On room - Bring it On
  • T
  • Technology Law Issues for Security Professionals

    Shannon Brown
    Sat, 10:00 - 10:50
    Bring It On room - Bring it On
  • The Evolution of Linux Kernel Module Signing

    Rebecca Shapiro
    Fri, 16:00 - 16:25
    Main Room - One Track Mind
  • The Life of Binaries

    Xeno Kovah
    Sat, 12:00 - 12:50
    Georgetown East - Trainer Exchange
  • The NSA: Capabilities and Countermeasures

    Bruce Schneier
    Sat, 15:00 - 15:50
    Bring It On room - Bring it On
  • The "Science of Cyber" and the Next Generation of Security Tools

    Paulo Shakarian
    Sat, 16:00 - 16:50
    Belay It room - Belay it
  • Timing-Based Attestation: Sexy Defense, or the Sexiest?

    John Butterworth, Corey Kallenberg, Xeno Kovah
    Sat, 17:00 - 17:50
    Belay It room - Belay it
  • TrendCoins: Making Money on the Bitcoin/Altcoin Trends

    Zac Hinkel
    Sat, 19:20 - 19:40
    Build It Room - Fire Talks
  • U
  • Unambiguous Encapsulation - Separating Data and Signaling

    Michael Ossmann, Dominic Spill
    Sat, 11:00 - 11:50
    Belay It room - Belay it
  • unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback

    Lee Harrison, Kang Li, Xiaoning Li
    Sun, 11:00 - 11:50
    Build It Room - Build It
  • V
  • Vehicle Forensics - The Data Beyond the Dashboard

    Courtney Lancaster
    Sun, 11:00 - 11:50
    Bring It On room - Bring it On
  • W
  • Weaponizing Your Pets: War Kitteh and the Denial of Service Dog

    Gene Bransfield, Garcon Coffee
    Fri, 21:30 - 21:50
    Build It Room - Fire Talks
  • Windows Attacks: AT Is the New Black

    Rob Fuller
    Fri, 21:10 - 21:30
    Build It Room - Fire Talks
  • Womens Tech Collective, and Gender Equality in Tech

    Sarah Clarke
    Fri, 21:50 - 22:10
    Build It Room - Fire Talks
  • Writing Your Own Disassembler in 15 Minutes

    Jay Little
    Sat, 19:40 - 20:00
    Build It Room - Fire Talks
  • Y
  • You Don't Have the Evidence

    Scott Moulton
    Sun, 12:00 - 12:50
    Bring It On room - Bring it On
  • You Name It, We Analyze It

    Jim Gilsinn
    Sat, 18:20 - 18:40
    Build It Room - Fire Talks