• Wednesday, August 6
  • SECSI PRODUCT DEVELOPMENT: TECHNIQUES FOR ENSURING SECURE SILICON APPLIED TO OPEN-SOURCE VERILOG PROJECTS

    Joe FitzPatrick
    Wed, 10:15 - 11:15
    South Seas IJ
  • WINDOWS KERNEL GRAPHICS DRIVER ATTACK SURFACE

    Ilja van Sprundel
    Wed, 11:45 - 12:45
    South Seas IJ
  • OPENSTACK CLOUD AT YAHOO SCALE: HOW TO AVOID DISASTER

    Anders Beitnes
    Wed, 14:15 - 14:45
    South Seas IJ
  • PROTECTING DATA IN-USE FROM FIRMWARE AND PHYSICAL ATTACKS

    Steve Weis
    Wed, 14:50 - 15:50
    South Seas IJ
  • FINDING AND EXPLOITING ACCESS CONTROL VULNERABILITIES IN GRAPHICAL USER INTERFACES

    Collin Mulliner
    Wed, 15:30 - 16:30
    South Seas IJ
  • COMPUTRACE BACKDOOR REVISITED

    Sergey Belov, Vitaliy Kamluk, Anibal Sacco
    Wed, 17:00 - 18:00
    South Seas IJ
  • Thursday, August 7
  • I KNOW YOUR FILTERING POLICY BETTER THAN YOU DO: EXTERNAL ENUMERATION AND EXPLOITATION OF EMAIL AND WEB SECURITY SOLUTIONS

    Ben Williams
    Thu, 09:00 - 10:00
    South Seas IJ
  • WHEN THE LIGHTS GO OUT: HACKING CISCO ENERGYWISE

    Ayhan Soner Koca, Matthias Luft
    Thu, 10:15 - 11:15
    South Seas IJ
  • INTERNET SCANNING - CURRENT STATE AND LESSONS LEARNED

    Mark Schloesser
    Thu, 11:45 - 12:15
    South Seas IJ
  • FROM ATTACKS TO ACTION - BUILDING A USABLE THREAT MODEL TO DRIVE DEFENSIVE CHOICES

    Tony Sager
    Thu, 12:20 - 12:45
    South Seas IJ
  • A JOURNEY TO PROTECT POINTS-OF-SALE

    Nir Valtman
    Thu, 15:30 - 16:30
    South Seas IJ
  • PROBABILISTIC SPYING ON ENCRYPTED TUNNELS

    Brandon Niemczyk, Prasad Rao
    Thu, 17:00 - 17:30
    South Seas IJ
  • BADGER - THE NETWORKED SECURITY STATE ESTIMATION TOOLKIT

    Edmond Rogers, William Rogers, Gabe Weaver
    Thu, 17:35 - 18:00
    South Seas IJ