• Wednesday, August 6
  • PREVALENT CHARACTERISTICS IN MODERN MALWARE

    Gabriel Negreira Barbosa, Rodrigo Rubira Branco
    Wed, 10:15 - 11:15
    South Seas E
  • CLOUDBOTS: HARVESTING CRYPTO COINS LIKE A BOTNET FARMER

    Rob Ragan, Oscar Salazar
    Wed, 11:45 - 12:45
    South Seas E
  • THE BEAST IS IN YOUR MEMORY: RETURN-ORIENTED PROGRAMMING ATTACKS AGAINST MODERN CONTROL-FLOW INTEGRITY PROTECTION TECHNIQUES

    Daniel Lehmann, Ahmad-Reza Sadeghi
    Wed, 14:15 - 15:15
    South Seas E
  • THE BIG CHILL: LEGAL LANDMINES THAT STIFLE SECURITY RESEARCH AND HOW TO DISARM THEM

    Kevin Bankston, Trey Ford, Marcia Hofmann
    Wed, 15:30 - 16:30
    South Seas E
  • ABUSING PERFORMANCE OPTIMIZATION WEAKNESSES TO BYPASS ASLR

    Yeongjin Jang, Byoungyoung Lee, Tielei Wang
    Wed, 17:00 - 18:00
    South Seas E
  • Thursday, August 7
  • WRITE ONCE, PWN ANYWHERE

    Yang Yu
    Thu, 09:00 - 10:00
    South Seas E
  • SAVING CYBERSPACE

    Jason Healey
    Thu, 10:15 - 11:15
    South Seas E
  • EXPLOITING UNPATCHED IOS VULNERABILITIES FOR FUN AND PROFIT

    Yeongjin Jang, Billy Lau, Byoungyoung Lee, Tielei Wang
    Thu, 11:45 - 12:45
    South Seas E
  • THE DEVIL DOES NOT EXIST - THE ROLE OF DECEPTION IN CYBER

    Matt Devost, Mark Mateski
    Thu, 14:15 - 15:15
    South Seas E
  • LIFECYCLE OF A PHONE FRAUDSTER: EXPOSING FRAUD ACTIVITY FROM RECONNAISSANCE TO TAKEOVER USING GRAPH ANALYSIS AND ACOUSTICAL ANOMALIES

    Vijay Balasubramaniyan, Raj Bandyopadhyay, Telvis Calhoun
    Thu, 15:30 - 16:30
    South Seas E
  • CREATING A SPIDER GOAT: USING TRANSACTIONAL MEMORY SUPPORT FOR SECURITY

    Igor Muttik, Alex Nayshtut
    Thu, 17:00 - 18:00
    South Seas E