0wn the Con
Analysis of POS Malware
Ask the EFF
Automated Binary Analysis with Pin and Python
Betting BIOS Bugs Won't Bite Y'er Butt?
Closing Remarks
Cockroach Analysis: A Statistical Analysis of the Flash and Java Files that Infest the Internet
Come to the Dark Side - We Have (Misfortune) Cookies
Deception for the Cyber Defender: To Err is Human; to Deceive, Divine
Don’t Look Now! Malicious Image Spam
Eliminating Timing Side-channels. A Tutorial.
Five Not-Totally-Crazy Ways to Build for Usability
Get Off My Lawn: Examining Change through the Eyes of The Old Guard
How Random is Your RNG?
httpscreenshot - A Tool for Both Teams
Infrastructure Tracking with Passive Monitoring and Active Probing
Keynote Address
Knock Knock: A Survey of iOS Authentication Methods
Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"
Mascots, March Madness & #yogapants: Hacking Goes to College
Micronesia: Sub-kernel Kit for Host Introspection in Determining Insider Threat
NaCl: A New Crypto Library
No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap
NSA Playset: USB Tools
Opening Remarks, Rumblings, and Rants
Practical Machine Learning for Network Security
Quantum Computing 01100101
Rethinking Security's Role in CS Education
SEWiFi: Building a Security Enhanced WiFi Dongle
Simple Windows Application Whitelisting Evasionˀ
Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry
The Dark Art of Data Visualization
The Joy Of Intelligent Proactive Security
The Mile High Club: Getting Root at 40,000 Feet
There's Waldo! Tracking Users via Mobile Apps
The Windows Sandbox Paradox
Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass
Userland Persistence on Mac OS X "It Just Works"
Where the Wild Things Are: Encryption, Police Access & the User
White is the New Black: Why White Data Really Matters