• Tuesday, August 5
  • How we deciphered millions of users’ encrypted passwords without the decryption keys.

    Joshua Dustin
    Tue, 12:00 - 12:20
    Track 1
  • Is Pavlovian Password Management The Answer?

    Lance James
    Tue, 12:30 - 13:00
    Track 1
  • DoCatsLikeLemon? – Advanced phrase attacks and analysis

    Marco Preuß
    Tue, 14:00 - 14:30
    Track 1
  • Tradeoff cryptanalysis of password hashing schemes

    Alex Biryukov, Johann Großschädl, Dmitry Khovratovich
    Tue, 14:30 - 15:00
    Track 1
  • Using cryptanalysis to speed-up password cracking

    Christian Rechberger
    Tue, 15:00 - 15:30
    Track 1
  • Password Security in the PCI DSS

    Jarred White
    Tue, 15:40 - 16:40
    Track 1
  • Defense with 2FA

    Steve Thomas
    Tue, 16:50 - 17:50
    Track 1
  • I have the #cat so I make the rules

    Yiannis Chrysanthou
    Tue, 18:00 - 18:30
    Track 1
  • Penetrate your OWA

    Nate Power
    Tue, 18:40 - 19:10
    Track 1
  • Wednesday, August 6
  • All your SAP P@$$w0ЯdZ belong to us

    Dmitry Chastuhin, Alexander Polyakov
    Wed, 10:00 - 10:30
    Track 1
  • Target specific automated dictionary generation

    Matt Marx
    Wed, 10:30 - 11:00
    Track 1
  • Bitslice DES with LOP3.LUT

    Steve Thomas
    Wed, 11:10 - 12:00
    Track 1
  • Net hashes: a review of many network protocols

    Rob Graham
    Wed, 12:10 - 13:00
    Track 1
  • Energy-efficient bcrypt cracking

    Katja Malvoni
    Wed, 14:00 - 15:00
    Track 1
  • The problem with the real world

    Michal Špaček
    Wed, 15:10 - 15:40
    Track 1
  • Password Topology Histogram Wear-Leveling, a.k.a. PathWell

    Rick Redman
    Wed, 15:50 - 16:50
    Track 1
  • Beam Me Up Scotty! – Passwords in the Enterprise

    Dimitri Fousekis
    Wed, 17:00 - 17:45
    Track 1