• 4
  • 48 DIRTY LITTLE SECRETS CRYPTOGRAPHERS DON'T WANT YOU TO KNOW

    Thomas Ptacek
    Thu, 14:15 - 15:15
    Lagoon K
  • 8
  • 802.1X AND BEYOND!

    Brad Antoniewicz
    Wed, 17:00 - 18:00
    Jasmine Ballroom
  • A
  • ABUSE OF CPE DEVICES AND RECOMMENDED FIXES

    Jonathan Spring, Paul Vixie
    Thu, 09:35 - 10:00
    South Seas CD
  • ABUSING MICROSOFT KERBEROS: SORRY YOU GUYS DON'T GET IT

    Benjamin Delpy, Alva Duckwall
    Thu, 11:45 - 12:45
    South Seas CD
  • ABUSING PERFORMANCE OPTIMIZATION WEAKNESSES TO BYPASS ASLR

    Yeongjin Jang, Byoungyoung Lee, Tielei Wang
    Wed, 17:00 - 18:00
    South Seas E
  • A JOURNEY TO PROTECT POINTS-OF-SALE

    Nir Valtman
    Thu, 15:30 - 16:30
    South Seas IJ
  • ANDROID FAKEID VULNERABILITY WALKTHROUGH

    Jeff Forristal
    Wed, 12:20 - 12:45
    Mandalay Bay D
  • API SECURITY ROUNDTABLE: LESSONS LEARNED IN API SECURITY

    Zane Lackey
    Wed, 10:15 - 11:15
    Palm A
  • A PRACTICAL ATTACK AGAINST VDI SOLUTIONS

    Daniel Brodie, Michael Shaulov
    Thu, 10:15 - 11:15
    Jasmine Ballroom
  • APT ATTRIBUTION AND DNS PROFILING

    Frankie Li
    Wed, 14:50 - 15:50
    South Seas GH
  • A SCALABLE, ENSEMBLE APPROACH FOR BUILDING AND VISUALIZING DEEP CODE-SHARING NETWORKS OVER MILLIONS OF MALICIOUS BINARIES

    Joshua Saxe
    Wed, 16:05 - 17:05
    South Seas F
  • A SURVEY OF REMOTE AUTOMOTIVE ATTACK SURFACES

    Charlie Miller, Christopher Valasek
    Wed, 11:45 - 12:45
    Lagoon K
  • ATTACKING MOBILE BROADBAND MODEMS LIKE A CRIMINAL WOULD

    Andreas Lindh
    Wed, 10:50 - 11:15
    South Seas CD
  • B
  • BABAR-IANS AT THE GATE: DATA PROTECTION AT MASSIVE SCALE

    Davi Ottenheimer
    Wed, 17:00 - 18:00
    South Seas F
  • BADGER - THE NETWORKED SECURITY STATE ESTIMATION TOOLKIT

    Edmond Rogers, William Rogers, Gabe Weaver
    Thu, 17:35 - 18:00
    South Seas IJ
  • BADUSB - ON ACCESSORIES THAT TURN EVIL

    Jakob Lell, Karsten Nohl
    Thu, 09:00 - 10:00
    Lagoon K
  • BE MEAN TO YOUR CODE ROUNDTABLE: SECURITY IN THE AGE OF CONTINUOUS INTEGRATION & DEPLOYMENT

    Matt Johansen
    Thu, 14:15 - 15:15
    Palm A
  • BITCOIN TRANSACTION MALLEABILITY THEORY IN PRACTICE

    Daniel Chechik, Ben Hayak
    Thu, 10:15 - 11:15
    South Seas CD
  • BREAKING THE SECURITY OF PHYSICAL DEVICES

    Silvio Cesare
    Wed, 17:00 - 18:00
    Lagoon K
  • BRINGING SOFTWARE DEFINED RADIO TO THE PENETRATION TESTING COMMUNITY

    Jonathan-Christofer Demay, Arnaud Lebrun, Jean-Michel Picod
    Wed, 11:45 - 12:45
    South Seas AB
  • BUILDING SAFE SYSTEMS AT SCALE - LESSONS FROM SIX MONTHS AT YAHOO

    Alex Stamos
    Thu, 10:15 - 11:15
    Lagoon K
  • C
  • CALL TO ARMS: A TALE OF THE WEAKNESSES OF CURRENT CLIENT-SIDE XSS FILTERING

    Martin Johns, Sebastian Lekies, Ben Stock
    Thu, 15:30 - 16:30
    Mandalay Bay D
  • CAPSTONE: NEXT GENERATION DISASSEMBLY FRAMEWORK

    Quynh Nguyen Anh
    Thu, 17:00 - 18:00
    South Seas CD
  • CATCHING MALWARE EN MASSE: DNS AND IP STYLE

    Dhia Mahjoub, Thibault Reuille, Andree Toonk
    Thu, 15:30 - 16:30
    South Seas AB
  • CELLULAR EXPLOITATION ON A GLOBAL SCALE: THE RISE AND FALL OF THE CONTROL PROTOCOL

    Marc Blanchou, Mathew Solnik
    Wed, 10:15 - 11:15
    Lagoon K
  • CERTIFICATIONS ROUNDTABLE: THE QUEST FOR VALUE

    Dave Lewis
    Wed, 15:30 - 16:30
    Palm A
  • CLOUDBOTS: HARVESTING CRYPTO COINS LIKE A BOTNET FARMER

    Rob Ragan, Oscar Salazar
    Wed, 11:45 - 12:45
    South Seas E
  • COMPUTRACE BACKDOOR REVISITED

    Sergey Belov, Vitaliy Kamluk, Anibal Sacco
    Wed, 17:00 - 18:00
    South Seas IJ
  • CONTEMPORARY AUTOMATIC PROGRAM ANALYSIS

    Julian Cohen
    Wed, 17:00 - 18:00
    South Seas GH
  • CREATING A SPIDER GOAT: USING TRANSACTIONAL MEMORY SUPPORT FOR SECURITY

    Igor Muttik, Alex Nayshtut
    Thu, 17:00 - 18:00
    South Seas E
  • CYBERSECURITY AS REALPOLITIK

    Dan Geer
    Wed, 09:00 - 10:00
    Mandalay Bay D
  • D
  • DATA-ONLY PWNING MICROSOFT WINDOWS KERNEL: EXPLOITATION OF KERNEL POOL OVERFLOWS ON MICROSOFT WINDOWS 8.1

    Nikita Tarakanov
    Wed, 14:15 - 15:15
    South Seas CD
  • DEFEATING THE TRANSPARENCY FEATURE OF DBI

    Kang Li, Xiaoning Li
    Wed, 12:20 - 12:45
    South Seas CD
  • DIGGING FOR IE11 SANDBOX ESCAPES

    James Forshaw
    Wed, 10:15 - 11:15
    South Seas GH
  • DYNAMIC FLASH INSTRUMENTATION FOR FUN AND PROFITĖ€

    Timo Hirvonen
    Wed, 15:30 - 16:30
    Jasmine Ballroom
  • E
  • EMBEDDED DEVICES ROUNDTABLE: EMBEDDING THE MODERN WORLD, WHERE DO WE GO FROM HERE?

    Don A. Bailey, Zach Lanier
    Wed, 14:15 - 15:15
    Palm A
  • EPIDEMIOLOGY OF SOFTWARE VULNERABILITIES: A STUDY OF ATTACK SURFACE SPREAD

    Jake Kouns, Kymberlee Price
    Thu, 09:00 - 09:30
    South Seas GH
  • EVASION OF HIGH-END IPS DEVICES IN THE AGE OF IPV6

    Antonios Atlasis, Enno Rey
    Wed, 10:15 - 10:45
    South Seas CD
  • EXPLOITING UNPATCHED IOS VULNERABILITIES FOR FUN AND PROFIT

    Yeongjin Jang, Billy Lau, Byoungyoung Lee, Tielei Wang
    Thu, 11:45 - 12:45
    South Seas E
  • EXPOSING BOOTKITS WITH BIOS EMULATION

    Lars Haukli
    Thu, 17:00 - 18:00
    South Seas AB
  • EXTREME PRIVILEGE ESCALATION ON WINDOWS 8/UEFI SYSTEMS

    Sam Cornwell, Corey Kallenberg, Xeno Kovah
    Thu, 10:15 - 11:15
    Mandalay Bay D
  • F
  • FINDING AND EXPLOITING ACCESS CONTROL VULNERABILITIES IN GRAPHICAL USER INTERFACES

    Collin Mulliner
    Wed, 15:30 - 16:30
    South Seas IJ
  • FINGERPRINTING WEB APPLICATION PLATFORMS BY VARIATIONS IN PNG IMPLEMENTATIONS

    Dominique Bongard
    Thu, 15:30 - 16:00
    South Seas GH
  • FROM ATTACKS TO ACTION - BUILDING A USABLE THREAT MODEL TO DRIVE DEFENSIVE CHOICES

    Tony Sager
    Thu, 12:20 - 12:45
    South Seas IJ
  • FULL SYSTEM EMULATION: ACHIEVING SUCCESSFUL AUTOMATED DYNAMIC ANALYSIS OF EVASIVE MALWARE

    Christopher Kruegel
    Wed, 11:45 - 12:45
    Jasmine Ballroom
  • G
  • GOVERNMENT POLICY ROUNDTABLE: UNDERSTANDING THE NIST RISK MANAGEMENT FRAMEWORK

    Tiffany Jones
    Wed, 11:45 - 12:45
    Palm A
  • GOVERNMENTS AS MALWARE AUTHORS: THE NEXT GENERATION

    Mikko Hypponen
    Wed, 14:15 - 15:15
    Mandalay Bay D
  • GRR: FIND ALL THE BADNESS, COLLECT ALL THE THINGS

    Greg Castle
    Thu, 11:45 - 12:45
    South Seas GH
  • H
  • HACKING THE WIRELESS WORLD WITH SOFTWARE DEFINED RADIO - 2.0

    Balint Seeber
    Thu, 17:00 - 18:00
    Lagoon K
  • HOW SMARTCARD PAYMENT SYSTEMS FAIL

    Ross Anderson
    Thu, 09:00 - 10:00
    South Seas F
  • HOW TO LEAK A 100-MILLION-NODE SOCIAL GRAPH IN JUST ONE WEEK? - A REFLECTION ON OAUTH AND API DESIGN IN ONLINE SOCIAL NETWORKS

    Pili Hu, Wing Cheong Lau
    Wed, 17:35 - 18:00
    Mandalay Bay D
  • HOW TO WEAR YOUR PASSWORD

    Markus Jakobsson
    Wed, 11:45 - 12:15
    South Seas CD
  • I
  • ICSCORSAIR: HOW I WILL PWN YOUR ERP THROUGH 4-20 MA CURRENT LOOP

    Alexander Bolshev, Gleb Cherbov
    Thu, 10:15 - 11:15
    South Seas AB
  • I KNOW YOUR FILTERING POLICY BETTER THAN YOU DO: EXTERNAL ENUMERATION AND EXPLOITATION OF EMAIL AND WEB SECURITY SOLUTIONS

    Ben Williams
    Thu, 09:00 - 10:00
    South Seas IJ
  • INTERNET SCANNING - CURRENT STATE AND LESSONS LEARNED

    Mark Schloesser
    Thu, 11:45 - 12:15
    South Seas IJ
  • INVESTIGATING POWERSHELL ATTACKS

    Matt Hastings, Ryan Kazanciyan
    Thu, 16:05 - 16:30
    South Seas GH
  • IT JUST (NET)WORKS: THE TRUTH ABOUT IOS 7'S MULTIPEER CONNECTIVITY FRAMEWORK

    Alban Diquet
    Thu, 09:00 - 09:30
    South Seas CD
  • L
  • LEARN HOW TO CONTROL EVERY ROOM AT A LUXURY HOTEL REMOTELY: THE DANGERS OF INSECURE HOME AUTOMATION DEPLOYMENT

    Jesus Molina
    Wed, 17:00 - 17:30
    Mandalay Bay D
  • LEVIATHAN: COMMAND AND CONTROL COMMUNICATIONS ON PLANET EARTH

    Kenneth Geers, Kevin Thompson
    Thu, 10:15 - 11:15
    South Seas F
  • LIFECYCLE OF A PHONE FRAUDSTER: EXPOSING FRAUD ACTIVITY FROM RECONNAISSANCE TO TAKEOVER USING GRAPH ANALYSIS AND ACOUSTICAL ANOMALIES

    Vijay Balasubramaniyan, Raj Bandyopadhyay, Telvis Calhoun
    Thu, 15:30 - 16:30
    South Seas E
  • M
  • MEDICAL DEVICES ROUNDTABLE: IS THERE A DOCTOR IN THE HOUSE? SECURITY AND PRIVACY IN THE MEDICAL WORLD

    Jerome Radcliffe
    Thu, 10:15 - 11:15
    Palm A
  • MINIATURIZATION

    Jason Larsen
    Thu, 14:15 - 15:15
    South Seas AB
  • MISSION MPOSSIBLE

    Jon Butler, Nils
    Thu, 11:45 - 12:45
    Lagoon K
  • MOBILE DEVICE MISMANAGEMENT

    Stephen Breen
    Wed, 14:15 - 15:15
    South Seas AB
  • MOBILE SECURITY ROUNDTABLE: WHAT DOES MOBILE SECURITY LOOK LIKE TODAY? WHAT WILL IT LOOK LIKE TOMORROW?

    Vincenzo Iozzo, Peiter Zatko
    Thu, 09:00 - 10:00
    Palm A
  • MORE SHADOW WALKER: THE PROGRESSION OF TLB-SPLITTING ON X86

    Jacob Torrey
    Thu, 11:45 - 12:45
    South Seas AB
  • MULTIPATH TCP: BREAKING TODAY'S NETWORKS WITH TOMORROW'S PROTOCOLS

    Xinwen Fu, Zhen Ling, Catherine Pearce, Patrick Thomas, Qinggang Yue
    Wed, 15:30 - 16:30
    South Seas AB
  • MY GOOGLE GLASS SEES YOUR PASSWORDS!

    Xinwen Fu, Zhen Ling, Qinggang Yue
    Wed, 11:45 - 12:15
    Mandalay Bay D
  • N
  • NETWORK ATTACHED SHELL: N.A.S.TY SYSTEMS THAT STORE NETWORK ACCESSIBLE SHELLS

    Jacob Holcomb
    Wed, 11:45 - 12:45
    South Seas F
  • "
  • "NOBODY IS LISTENING TO YOUR PHONE CALLS." REALLY? A DEBATE AND DISCUSSION ON THE NSA'S ACTIVITIES

    J. Michael Allen, Mark Jaycox
    Thu, 14:15 - 15:15
    South Seas F
  • O
  • ONE PACKER TO RULE THEM ALL: EMPIRICAL IDENTIFICATION, COMPARISON, AND CIRCUMVENTION OF CURRENT ANTIVIRUS DETECTION TECHNIQUES

    Alaeddine Mesbahi, Arne Swinnen
    Thu, 09:35 - 10:00
    South Seas GH
  • OPENSTACK CLOUD AT YAHOO SCALE: HOW TO AVOID DISASTER

    Anders Beitnes
    Wed, 14:15 - 14:45
    South Seas IJ
  • ORACLE DATA REDACTION IS BROKEN

    David Litchfield
    Wed, 14:15 - 15:15
    Lagoon K
  • P
  • PIVOTING IN AMAZON CLOUDS

    Andres Riancho
    Wed, 10:15 - 11:15
    South Seas AB
  • POACHER TURNED GAMEKEEPER: LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS

    Rafal Wojtczuk
    Thu, 17:00 - 18:00
    Mandalay Bay D
  • POINT OF SALE SYSTEM ARCHITECTURE AND SECURITY

    Lucas Zaichkowsky
    Wed, 14:15 - 14:45
    South Seas GH
  • PRAGMATIC SECURITY AUTOMATION ROUNDTABLE

    Rich Mogull
    Thu, 11:45 - 12:45
    Palm A
  • PREVALENT CHARACTERISTICS IN MODERN MALWARE

    Gabriel Negreira Barbosa, Rodrigo Rubira Branco
    Wed, 10:15 - 11:15
    South Seas E
  • PROBABILISTIC SPYING ON ENCRYPTED TUNNELS

    Brandon Niemczyk, Prasad Rao
    Thu, 17:00 - 17:30
    South Seas IJ
  • PROTECTING DATA IN-USE FROM FIRMWARE AND PHYSICAL ATTACKS

    Steve Weis
    Wed, 14:50 - 15:50
    South Seas IJ
  • PULLING BACK THE CURTAIN ON AIRPORT SECURITY: CAN A WEAPON GET PAST TSA?

    Billy Rios
    Wed, 15:30 - 16:30
    Lagoon K
  • R
  • RAVAGE - RUNTIME ANALYSIS OF VULNERABILITIES AND GENERATION OF EXPLOITS

    Yoel Gluck, Xiaoran Wang
    Thu, 11:45 - 12:45
    Jasmine Ballroom
  • REFLECTIONS ON TRUSTING TRUSTZONE

    Dan Rosenberg
    Wed, 15:30 - 16:30
    Mandalay Bay D
  • RESEARCHING ANDROID DEVICE SECURITY WITH THE HELP OF A DROID ARMY

    Joshua Drake
    Wed, 17:00 - 18:00
    South Seas CD
  • RESPONSIBLE DISCLOSURE ROUNDTABLE: YOU MAD BRO?

    Trey Ford
    Wed, 17:00 - 18:00
    Palm A
  • REVERSE ENGINEERING FLASH MEMORY FOR FUN AND BENEFIT

    Jeongwook Oh
    Wed, 10:15 - 11:15
    Jasmine Ballroom
  • REVERSE-ENGINEERING THE SUPRA IBOX: EXPLOITATION OF A HARDENED MSP430-BASED DEVICE

    Braden Thomas
    Thu, 09:00 - 10:00
    South Seas AB
  • S
  • SAP, CREDIT CARDS, AND THE BIRD THAT TALKS TOO MUCH

    Ertunga Arsal
    Thu, 15:30 - 16:30
    South Seas F
  • SATCOM TERMINALS: HACKING BY AIR, SEA, AND LAND

    Ruben Santamarta
    Thu, 15:30 - 16:30
    Lagoon K
  • SAVING CYBERSPACE

    Jason Healey
    Thu, 10:15 - 11:15
    South Seas E
  • SECSI PRODUCT DEVELOPMENT: TECHNIQUES FOR ENSURING SECURE SILICON APPLIED TO OPEN-SOURCE VERILOG PROJECTS

    Joe FitzPatrick
    Wed, 10:15 - 11:15
    South Seas IJ
  • SECURE BECAUSE MATH: A DEEP-DIVE ON MACHINE LEARNING-BASED MONITORING

    Alex Pinto
    Wed, 15:30 - 16:30
    South Seas GH
  • SECURITY AND SOFTWARE DEFINED NETWORKING ROUNDTABLE: NEW EXPOSURES OR NEW OPPORTUNITIES?

    Bob Stratton
    Thu, 15:30 - 16:30
    Palm A
  • SIDEWINDER TARGETED ATTACK AGAINST ANDROID IN THE GOLDEN AGE OF AD LIBS

    Tao Wei, Yulong Zhang
    Thu, 10:15 - 10:45
    South Seas GH
  • SMART NEST THERMOSTAT: A SMART SPY IN YOUR HOME

    Daniel Buentello, Grant Hernandez, Yier Jin
    Thu, 11:45 - 12:45
    Mandalay Bay D
  • STATIC DETECTION AND AUTOMATIC EXPLOITATION OF INTENT MESSAGE VULNERABILITIES IN ANDROID APPLICATIONS

    Daniele Gallingani
    Thu, 14:50 - 15:15
    South Seas CD
  • STAY OUT OF THE KITCHEN: A DLP SECURITY BAKE-OFF

    Zach Lanier, Kelly Lum
    Thu, 09:00 - 10:00
    Jasmine Ballroom
  • SVG: EXPLOITING BROWSERS WITHOUT IMAGE PARSING BUGS

    Rennie deGraaf
    Thu, 14:15 - 14:45
    South Seas CD
  • T
  • THE BEAST IS IN YOUR MEMORY: RETURN-ORIENTED PROGRAMMING ATTACKS AGAINST MODERN CONTROL-FLOW INTEGRITY PROTECTION TECHNIQUES

    Daniel Lehmann, Ahmad-Reza Sadeghi
    Wed, 14:15 - 15:15
    South Seas E
  • THE BEAST WINS AGAIN: WHY TLS KEEPS FAILING TO PROTECT HTTP

    Antoine Delignat-Lavaud
    Wed, 10:15 - 11:15
    Mandalay Bay D
  • THE BIG CHILL: LEGAL LANDMINES THAT STIFLE SECURITY RESEARCH AND HOW TO DISARM THEM

    Kevin Bankston, Trey Ford, Marcia Hofmann
    Wed, 15:30 - 16:30
    South Seas E
  • THE DEVIL DOES NOT EXIST - THE ROLE OF DECEPTION IN CYBER

    Matt Devost, Mark Mateski
    Thu, 14:15 - 15:15
    South Seas E
  • THE LIBRARY OF SPARTA

    Greg Conti, Tom Cross, David Raymond
    Wed, 10:15 - 11:15
    South Seas F
  • THE NEW PAGE OF INJECTIONS BOOK: MEMCACHED INJECTIONS

    Ivan Novikov
    Thu, 17:00 - 18:00
    South Seas F
  • THE NEW SCOURGE OF RANSOMWARE: A STUDY OF CRYPTOLOCKER AND ITS FRIENDS

    John Bambenek, Lance James
    Thu, 09:00 - 10:00
    Mandalay Bay D
  • THE STATE OF INCIDENT RESPONSE

    Bruce Schneier
    Thu, 14:15 - 15:15
    Mandalay Bay D
  • THINKING OUTSIDE THE SANDBOX - VIOLATING TRUST BOUNDARIES IN UNCOMMON WAYS

    Brian Gorenc, Jasiel Spelman
    Thu, 11:45 - 12:45
    South Seas F
  • THREAT INTELLIGENCE LIBRARY - A NEW REVOLUTIONARY TECHNOLOGY TO ENHANCE THE SOC BATTLE RHYTHM!

    Ryan Trost
    Thu, 10:50 - 11:15
    South Seas GH
  • TIME TRIAL: RACING TOWARDS PRACTICAL TIMING ATTACKS

    Daniel A. Mayer, Joel Sandin
    Thu, 14:15 - 15:15
    Jasmine Ballroom
  • U
  • UNDERSTANDING IMSI PRIVACY

    Ravishankar Borgaonkar, Swapnil Udar
    Thu, 15:30 - 16:30
    Jasmine Ballroom
  • UNDERSTANDING TOCTTOU IN THE WINDOWS KERNEL FONT SCALER ENGINE

    Yu Wang
    Thu, 17:00 - 18:00
    Jasmine Ballroom
  • UNVEILING THE OPEN SOURCE VISUALIZATION ENGINE FOR BUSY HACKERS

    Andrew Hay, Thibault Reuille
    Wed, 14:15 - 15:15
    Jasmine Ballroom
  • UNWRAPPING THE TRUTH: ANALYSIS OF MOBILE APPLICATION WRAPPING SOLUTIONS

    Ron Gutierrez, Stephen Komal
    Thu, 17:00 - 18:00
    South Seas GH
  • V
  • VOIP WARS: ATTACK OF THE CISCO PHONES

    Fatih Ozavci
    Wed, 14:15 - 15:15
    South Seas F
  • W
  • WHAT GOES AROUND COMES BACK AROUND - EXPLOITING FUNDAMENTAL WEAKNESSES IN BOTNET C&C PANELS!

    Aditya K. Sood
    Wed, 15:30 - 16:00
    South Seas F
  • WHEN THE LIGHTS GO OUT: HACKING CISCO ENERGYWISE

    Ayhan Soner Koca, Matthias Luft
    Thu, 10:15 - 11:15
    South Seas IJ
  • WHY CONTROL SYSTEM CYBER-SECURITY SUCKS...

    Dr. Stefan Lders
    Wed, 15:30 - 16:30
    South Seas CD
  • WHY YOU NEED TO DETECT MORE THAN PTH

    Matthew Hathaway, Jeff Myers
    Thu, 15:30 - 16:30
    South Seas CD
  • WINDOWS KERNEL GRAPHICS DRIVER ATTACK SURFACE

    Ilja van Sprundel
    Wed, 11:45 - 12:45
    South Seas IJ
  • WRITE ONCE, PWN ANYWHERE

    Yang Yu
    Thu, 09:00 - 10:00
    South Seas E