• Saturday, January 18
  • Genuinely "Trusted Computing:" Free and Open Hardware Security Modules

    Ryan Lackey
    Sat, 10:00 - 10:50
    Build It Room - Build It
  • Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms

    Pablo San Emeterio, Jaime Sanchez
    Sat, 11:00 - 11:50
    Build It Room - Build It
  • SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography

    Daniel J. Bernstein, Tanja Lange
    Sat, 12:00 - 12:50
    Build It Room - Build It
  • Controlling USB Flash Drive Controllers: Expose of Hidden Features

    Richard Harman
    Sat, 14:00 - 14:50
    Build It Room - Build It
  • 0wn the Con

    The Shmoo Group
    Sat, 15:00 - 15:50
    Build It Room - Build It
  • AV Evasion With the Veil Framework

    Will Schroeder, Christopher Truncer, Mike Wright
    Sat, 16:00 - 16:50
    Build It Room - Build It
  • ADD -- Complicating Memory Forensics Through Memory Disarray

    Alissa Torres, Jake Williams
    Sat, 17:00 - 17:50
    Build It Room - Build It
  • Sunday, January 19
  • An Open and Affordable USB Man in the Middle Device

    Dominic Spill
    Sun, 10:00 - 10:50
    Build It Room - Build It
  • unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback

    Lee Harrison, Kang Li, Xiaoning Li
    Sun, 11:00 - 11:50
    Build It Room - Build It
  • Introducing idb - Simplified Blackbox iOS App Pentesting

    Daniel A. Mayer
    Sun, 12:00 - 12:20
    Build It Room - Build It