• 0
  • 0wn the Con

    The Shmoo Group
    Sat, 17:00 - 17:50
    Build It
  • A
  • Analysis of POS Malware

    Brandon Benson
    Sat, 11:00 - 11:50
    Bring It On
  • Ask the EFF

    Nate Cardozo, Kurt Opsahl
    Sat, 17:00 - 17:50
    Bring It On
  • Automated Binary Analysis with Pin and Python

    Omar Ahmed, Tyler Bohan
    Sat, 14:00 - 14:50
    Build It
  • B
  • Betting BIOS Bugs Won't Bite Y'er Butt?

    Corey Kallenberg, Xeno Kovah
    Fri, 18:00 - 18:25
    One Track Mind
  • C
  • Closing Remarks

    Bruce Potter
    Sun, 14:30 - 15:20
    One Track Mind
  • Cockroach Analysis: A Statistical Analysis of the Flash and Java Files that Infest the Internet

    David Dorsey
    Sat, 10:00 - 10:50
    Belay It
  • Come to the Dark Side - We Have (Misfortune) Cookies

    Lior Oppenheim, Shahar Tal
    Sat, 14:00 - 14:50
    Bring It On
  • D
  • Deception for the Cyber Defender: To Err is Human; to Deceive, Divine

    Greg Conti, Tom Cross, David Raymond
    Sat, 15:00 - 15:50
    Bring It On
  • Don’t Look Now! Malicious Image Spam

    Kathy Liszka
    Fri, 16:30 - 16:55
    One Track Mind
  • E
  • Eliminating Timing Side-channels. A Tutorial.

    Peter Schwabe
    Sun, 11:00 - 11:50
    Build It
  • F
  • Five Not-Totally-Crazy Ways to Build for Usability

    Elissa Shevinsky
    Fri, 15:30 - 15:55
    One Track Mind
  • G
  • Get Off My Lawn: Examining Change through the Eyes of The Old Guard

    Carole Fennelly, Dr. Rick Forno, Ben Laurie, Bruce Potter, Space Rogue
    Sun, 13:30 - 14:20
    One Track Mind
  • H
  • How Random is Your RNG?

    John Kelsey, Kerry McKay, Meltem Sönmez Turan
    Sun, 12:00 - 12:50
    Bring It On
  • httpscreenshot - A Tool for Both Teams

    Stephen Breen, Justin Kennedy
    Sat, 12:00 - 12:50
    Build It
  • I
  • Infrastructure Tracking with Passive Monitoring and Active Probing

    Anthony Kasza, Dhia Mahjoub
    Sun, 11:00 - 11:50
    Belay It
  • K
  • Keynote Address

    Joseph Lorenzo Hall
    Fri, 18:30 - 18:55
    One Track Mind
  • Knock Knock: A Survey of iOS Authentication Methods

    David Schuetz
    Sat, 11:00 - 11:50
    Build It
  • M
  • Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"

    Elvis Hovor, Shimon Modi
    Sat, 16:00 - 16:50
    Belay It
  • Mascots, March Madness & #yogapants: Hacking Goes to College

    Zack Allen, Chris Cullison, Avi Rubin
    Sun, 11:00 - 11:50
    Bring It On
  • Micronesia: Sub-kernel Kit for Host Introspection in Determining Insider Threat

    Loc Nguyen
    Sun, 12:00 - 12:50
    Belay It
  • N
  • NaCl: A New Crypto Library

    Daniel J. Bernstein, Tanja Lange
    Sat, 15:00 - 15:50
    Build It
  • No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap

    Andrew Morris
    Sun, 10:00 - 10:50
    Belay It
  • NSA Playset: USB Tools

    Jared Boone, Michael Ossmann, Dominic Spill
    Sat, 10:00 - 10:50
    Build It
  • O
  • Opening Remarks, Rumblings, and Rants

    Bruce Potter
    Fri, 14:30 - 14:55
    One Track Mind
  • P
  • Practical Machine Learning for Network Security

    Terry Nelms
    Sat, 14:00 - 14:50
    Belay It
  • Q
  • Quantum Computing 01100101

    Tess Schrodinger
    Sat, 12:00 - 12:50
    Bring It On
  • R
  • Rethinking Security's Role in CS Education

    Sarah Zatko
    Sat, 16:00 - 16:50
    Bring It On
  • S
  • SEWiFi: Building a Security Enhanced WiFi Dongle

    Ryan Holeman
    Fri, 17:30 - 17:55
    One Track Mind
  • Simple Windows Application Whitelisting Evasionˀ

    Casey Smith
    Fri, 16:00 - 16:25
    One Track Mind
  • T
  • Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry

    Joshua Franklin, Kristen K. Greene, John Kelsey
    Sat, 16:00 - 16:50
    Build It
  • The Dark Art of Data Visualization

    David Pisano
    Sun, 12:00 - 12:50
    Build It
  • The Joy Of Intelligent Proactive Security

    Scott Behrens, Andy Hoernecke
    Sat, 15:00 - 15:50
    Belay It
  • The Mile High Club: Getting Root at 40,000 Feet

    Wesley Wineberg
    Sun, 10:00 - 10:50
    Bring It On
  • There's Waldo! Tracking Users via Mobile Apps

    Colby Moore, Patrick Wardle
    Sat, 12:00 - 12:50
    Belay It
  • The Windows Sandbox Paradox

    James Forshaw
    Sat, 17:00 - 17:50
    Belay It
  • U
  • Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass

    Jared DeMott
    Sat, 11:00 - 11:50
    Belay It
  • Userland Persistence on Mac OS X "It Just Works"

    Joshua Pitts
    Fri, 17:00 - 17:25
    One Track Mind
  • W
  • Where the Wild Things Are: Encryption, Police Access & the User

    Whitney Merrill
    Sat, 10:00 - 10:50
    Bring It On
  • White is the New Black: Why White Data Really Matters

    Irena Damsky
    Sun, 10:00 - 10:50
    Build It