• B
  • Being a Victim can be a Crime [Ain’t Losin’ Data a Breach?]

    Anthony Czarnik
    Fri, 15:00 - 15:25
    Track 2
  • BREAKING in BAD! (I’m the one who doesn’t knock)

    Jayson E. Street
    Fri, 18:00 - 18:50
    Track One
  • Building a Poor Man’s RFID Cloner

    Kevin Bong
    Fri, 15:00 - 15:50
    Track One
  • Bypassing the Secure Desktop Protections

    Marcio Almeida de Macedo, Bruno Oliveira
    Thu, 17:30 - 17:55
    Track 2
  • C
  • Card skimming using a RaspberryPi

    David Bryan
    Fri, 13:30 - 13:55
    Track 2
  • Cartero - Another Social Engineering Framework

    Matias Brutti
    Fri, 13:00 - 13:50
    Track One
  • Compliance kills the security star - Why security standards kill security!

    Johannes Stillig
    Fri, 17:30 - 17:55
    Track 2
  • Curry and TARTS: A new technique for avoiding side-channel attacks on cryptosystems

    JP Smith
    Thu, 12:00 - 12:25
    Track 2
  • D
  • Detecting Bluetooth Surveillance Systems

    Grant Bugher
    Thu, 11:30 - 11:55
    Track 2
  • E
  • Everything You Need to Know About Crypto in 50 minutes

    Jon Callas
    Fri, 11:00 - 11:50
    Track One
  • Explore that which can not be explored

    Matthew Jakubowski, Jonathan Tomek
    Thu, 15:30 - 15:55
    Track 2
  • F
  • Firmware Vulnerability Analysis

    Jeremy Richards
    Thu, 17:00 - 17:50
    Track One
  • G
  • GATTACA - Final Warning!

    Michael Goetzman
    Thu, 11:00 - 11:25
    Track 2
  • Giving a LUKS. Learning to encrypt your data properly.

    Pat Litke
    Thu, 13:00 - 13:25
    Track 2
  • GSM Sucks: Detecting IMSI Catchers

    Freddy Martinez
    Fri, 12:30 - 12:55
    Track 2
  • H
  • Hacking Citizens United, or How to Influence Elections on a Budget

    admford
    Fri, 13:00 - 13:25
    Track 2
  • Hacking the CFAA: What You Need to Know, What’s Happening, and Where It’s Going.

    Whitney Merrill
    Thu, 17:00 - 17:25
    Track 2
  • How to Grow a Hacker

    David Shaw
    Thu, 18:00 - 18:25
    Track 2
  • I
  • InfoSec: What we know, and what we need to know.

    Jack Daniel
    Fri, 16:00 - 16:50
    Track One
  • K
  • Killing them Softly – Hunting on DarkNet

    Aamir Lakhani
    Fri, 11:30 - 11:55
    Track 2
  • M
  • Medical Device Security: An Infectious Disease

    Adam Brand, Scott Erven
    Thu, 12:30 - 12:55
    Track 2
  • MMORPG (Massively Multiplayer Online Real-world Political Gamechanging)

    nkryptr
    Thu, 15:00 - 15:25
    Track 2
  • O
  • One Step Closer to the Matrix: Machine Learning and Augmented Reality in Networking Defense

    John Eberhardt, Rob Weiss
    Fri, 15:30 - 15:55
    Track 2
  • P
  • Pwning People Personally

    FuzzyNop
    Thu, 18:00 - 18:50
    Track One
  • S
  • Synspotting for Teenagers and Real Swinging Adults

    Steve Ocepek
    Thu, 12:00 - 12:50
    Track One
  • T
  • The Bad, The Worse, and The Ugly - No Hope for POS Security

    Rob Havelt
    Fri, 12:00 - 12:50
    Track One
  • The Ghost of Security Past

    Christopher Valasek
    Thu, 11:00 - 11:50
    Track One
  • The Right to be Forgotten - Now the EU, Tomorrow the World?

    Jim Rennie
    Thu, 13:30 - 13:55
    Track 2
  • Threat Modeling in the Gaming Industry

    Robert Wood
    Thu, 18:30 - 18:55
    Track 2
  • Trojaned Gems - You can’t tell you’re using one!

    Jonathan Claudius, Brandon Myers
    Fri, 17:00 - 17:50
    Track One
  • V
  • Vomiting Shells: Tracking the Splatter Patterns

    Ryan Linn
    Thu, 15:00 - 15:50
    Track One
  • W
  • Wanna Cyber?

    Tod Beardsley, egypt
    Thu, 14:00 - 14:50
    Track One
  • We Don't Need Another Damn Whitepaper: Going Kinetic on Cybercrime Networks on a Budget

    John Bambenek
    Fri, 12:00 - 12:25
    Track 2
  • Week to Weak: Weaponization of Vulnerabilities

    Nick Espinoza
    Thu, 13:00 - 13:50
    Track One
  • Wireless Drone Strikes Episode II: Attack of the Drones!

    David Jordan, Parker Schmitt
    Fri, 17:00 - 17:25
    Track 2