• Wednesday, August 6
  • CYBERSECURITY AS REALPOLITIK

    Dan Geer
    Wed, 09:00 - 10:00
    Mandalay Bay D
  • THE BEAST WINS AGAIN: WHY TLS KEEPS FAILING TO PROTECT HTTP

    Antoine Delignat-Lavaud
    Wed, 10:15 - 11:15
    Mandalay Bay D
  • MY GOOGLE GLASS SEES YOUR PASSWORDS!

    Xinwen Fu, Zhen Ling, Qinggang Yue
    Wed, 11:45 - 12:15
    Mandalay Bay D
  • ANDROID FAKEID VULNERABILITY WALKTHROUGH

    Jeff Forristal
    Wed, 12:20 - 12:45
    Mandalay Bay D
  • GOVERNMENTS AS MALWARE AUTHORS: THE NEXT GENERATION

    Mikko Hypponen
    Wed, 14:15 - 15:15
    Mandalay Bay D
  • REFLECTIONS ON TRUSTING TRUSTZONE

    Dan Rosenberg
    Wed, 15:30 - 16:30
    Mandalay Bay D
  • LEARN HOW TO CONTROL EVERY ROOM AT A LUXURY HOTEL REMOTELY: THE DANGERS OF INSECURE HOME AUTOMATION DEPLOYMENT

    Jesus Molina
    Wed, 17:00 - 17:30
    Mandalay Bay D
  • HOW TO LEAK A 100-MILLION-NODE SOCIAL GRAPH IN JUST ONE WEEK? - A REFLECTION ON OAUTH AND API DESIGN IN ONLINE SOCIAL NETWORKS

    Pili Hu, Wing Cheong Lau
    Wed, 17:35 - 18:00
    Mandalay Bay D
  • Thursday, August 7
  • THE NEW SCOURGE OF RANSOMWARE: A STUDY OF CRYPTOLOCKER AND ITS FRIENDS

    John Bambenek, Lance James
    Thu, 09:00 - 10:00
    Mandalay Bay D
  • EXTREME PRIVILEGE ESCALATION ON WINDOWS 8/UEFI SYSTEMS

    Sam Cornwell, Corey Kallenberg, Xeno Kovah
    Thu, 10:15 - 11:15
    Mandalay Bay D
  • SMART NEST THERMOSTAT: A SMART SPY IN YOUR HOME

    Daniel Buentello, Grant Hernandez, Yier Jin
    Thu, 11:45 - 12:45
    Mandalay Bay D
  • THE STATE OF INCIDENT RESPONSE

    Bruce Schneier
    Thu, 14:15 - 15:15
    Mandalay Bay D
  • CALL TO ARMS: A TALE OF THE WEAKNESSES OF CURRENT CLIENT-SIDE XSS FILTERING

    Martin Johns, Sebastian Lekies, Ben Stock
    Thu, 15:30 - 16:30
    Mandalay Bay D
  • POACHER TURNED GAMEKEEPER: LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS

    Rafal Wojtczuk
    Thu, 17:00 - 18:00
    Mandalay Bay D