• Saturday, January 17
  • Cockroach Analysis: A Statistical Analysis of the Flash and Java Files that Infest the Internet

    David Dorsey
    Sat, 10:00 - 10:50
    Belay It
  • Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass

    Jared DeMott
    Sat, 11:00 - 11:50
    Belay It
  • There's Waldo! Tracking Users via Mobile Apps

    Colby Moore, Patrick Wardle
    Sat, 12:00 - 12:50
    Belay It
  • Practical Machine Learning for Network Security

    Terry Nelms
    Sat, 14:00 - 14:50
    Belay It
  • The Joy Of Intelligent Proactive Security

    Scott Behrens, Andy Hoernecke
    Sat, 15:00 - 15:50
    Belay It
  • Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"

    Elvis Hovor, Shimon Modi
    Sat, 16:00 - 16:50
    Belay It
  • The Windows Sandbox Paradox

    James Forshaw
    Sat, 17:00 - 17:50
    Belay It
  • Sunday, January 18
  • No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap

    Andrew Morris
    Sun, 10:00 - 10:50
    Belay It
  • Infrastructure Tracking with Passive Monitoring and Active Probing

    Anthony Kasza, Dhia Mahjoub
    Sun, 11:00 - 11:50
    Belay It
  • Micronesia: Sub-kernel Kit for Host Introspection in Determining Insider Threat

    Loc Nguyen
    Sun, 12:00 - 12:50
    Belay It