• Wednesday, August 5
  • How to Hack Government: Technologists as Policy Makers

    Terrell McSweeny, Ashkan Soltani
    Wed, 10:20 - 11:10
    Lagoon K
  • Breaking HTTPS with BGP Hijacking

    Artyom Gavrichenkov
    Wed, 11:30 - 12:20
    Lagoon K
  • Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing

    Alex Pinto, Alexandre Sieira
    Wed, 13:50 - 14:40
    Lagoon K
  • WSUSpect - Compromising the Windows Enterprise via Windows Update

    Alex Chapman, Paul Stone
    Wed, 15:00 - 15:50
    Lagoon K
  • Faux Disk Encryption: Realities of Secure Storage on Mobile Devices

    Daniel A. Mayer, Drew Suarez
    Wed, 16:20 - 17:10
    Lagoon K
  • Subverting Satellite Receivers for Botnet and Profit

    Sofiane Talmat
    Wed, 17:30 - 18:00
    Lagoon K
  • Thursday, August 6
  • CrackLord: Maximizing Password Cracking Boxes

    Michael McAtee, Lucas Morris
    Thu, 09:00 - 09:25
    Lagoon K
  • Web Timing Attacks Made Practical

    Jason Morgan, Timothy Morgan
    Thu, 09:45 - 10:35
    Lagoon K
  • Breaking Access Controls with BLEKey

    Mark Baseggio, Eric Evenchick
    Thu, 11:00 - 11:50
    Lagoon K
  • Forging the USB Armory an Open Source Secure Flash-Drive-Sized Computer

    Andrea Barisani, Daniele Bianco
    Thu, 12:10 - 13:00
    Lagoon K
  • When IoT Attacks: Hacking a Linux-Powered Rifle

    Michael Auger, Runa A. Sandvik
    Thu, 14:30 - 15:20
    Lagoon K
  • Abusing XSLT for Practical Attacks

    Fernando Arnaboldi
    Thu, 15:50 - 16:40
    Lagoon K
  • Fuzzing Android System Services by Binder Call to Escalate Privilege

    Guang Gong
    Thu, 17:00 - 17:25
    Lagoon K