• Thursday, May 14
  • GATTACA - Final Warning!

    Michael Goetzman
    Thu, 11:00 - 11:25
    Track 2
  • Detecting Bluetooth Surveillance Systems

    Grant Bugher
    Thu, 11:30 - 11:55
    Track 2
  • Curry and TARTS: A new technique for avoiding side-channel attacks on cryptosystems

    JP Smith
    Thu, 12:00 - 12:25
    Track 2
  • Medical Device Security: An Infectious Disease

    Adam Brand, Scott Erven
    Thu, 12:30 - 12:55
    Track 2
  • Giving a LUKS. Learning to encrypt your data properly.

    Pat Litke
    Thu, 13:00 - 13:25
    Track 2
  • The Right to be Forgotten - Now the EU, Tomorrow the World?

    Jim Rennie
    Thu, 13:30 - 13:55
    Track 2
  • MMORPG (Massively Multiplayer Online Real-world Political Gamechanging)

    nkryptr
    Thu, 15:00 - 15:25
    Track 2
  • Explore that which can not be explored

    Matthew Jakubowski, Jonathan Tomek
    Thu, 15:30 - 15:55
    Track 2
  • Hacking the CFAA: What You Need to Know, What’s Happening, and Where It’s Going.

    Whitney Merrill
    Thu, 17:00 - 17:25
    Track 2
  • Bypassing the Secure Desktop Protections

    Marcio Almeida de Macedo, Bruno Oliveira
    Thu, 17:30 - 17:55
    Track 2
  • How to Grow a Hacker

    David Shaw
    Thu, 18:00 - 18:25
    Track 2
  • Threat Modeling in the Gaming Industry

    Robert Wood
    Thu, 18:30 - 18:55
    Track 2
  • Friday, May 15
  • Killing them Softly – Hunting on DarkNet

    Aamir Lakhani
    Fri, 11:30 - 11:55
    Track 2
  • We Don't Need Another Damn Whitepaper: Going Kinetic on Cybercrime Networks on a Budget

    John Bambenek
    Fri, 12:00 - 12:25
    Track 2
  • GSM Sucks: Detecting IMSI Catchers

    Freddy Martinez
    Fri, 12:30 - 12:55
    Track 2
  • Hacking Citizens United, or How to Influence Elections on a Budget

    admford
    Fri, 13:00 - 13:25
    Track 2
  • Card skimming using a RaspberryPi

    David Bryan
    Fri, 13:30 - 13:55
    Track 2
  • Being a Victim can be a Crime [Ain’t Losin’ Data a Breach?]

    Anthony Czarnik
    Fri, 15:00 - 15:25
    Track 2
  • One Step Closer to the Matrix: Machine Learning and Augmented Reality in Networking Defense

    John Eberhardt, Rob Weiss
    Fri, 15:30 - 15:55
    Track 2
  • Wireless Drone Strikes Episode II: Attack of the Drones!

    David Jordan, Parker Schmitt
    Fri, 17:00 - 17:25
    Track 2
  • Compliance kills the security star - Why security standards kill security!

    Johannes Stillig
    Fri, 17:30 - 17:55
    Track 2