• Wednesday, August 5
  • Writing Bad @$$ Malware for OS X

    Patrick Wardle
    Wed, 10:20 - 11:10
    Mandalay Bay EF
  • Defeating Pass-the-Hash: Separation of Powers

    Seth Moore, Baris Saydag
    Wed, 11:30 - 12:20
    Mandalay Bay EF
  • Red vs Blue: Modern Active Directory Attacks Detection and Protection

    Sean Metcalf
    Wed, 13:50 - 14:40
    Mandalay Bay EF
  • Remote Exploitation of an Unaltered Passenger Vehicle

    Charlie Miller, Christopher Valasek
    Wed, 15:00 - 15:50
    Mandalay Bay EF
  • Abusing Windows Management Instrumentation (WMI) to Build a Persistent Asynchronous and Fileless Backdoor

    Matthew Graeber
    Wed, 16:20 - 17:10
    Mandalay Bay EF
  • Cloning 3G/4G SIM Cards with a PC and an Oscilloscope: Lessons Learned in Physical Security

    Yu Yu
    Wed, 17:30 - 18:00
    Mandalay Bay EF
  • Thursday, August 6
  • Attacking Your Trusted Core: Exploiting Trustzone on Android

    Di Shen
    Thu, 09:00 - 09:25
    Mandalay Bay EF
  • The NSA Playset: A Year of Toys and Tools

    Michael Ossmann
    Thu, 09:45 - 10:35
    Mandalay Bay EF
  • Defeating Machine Learning: What Your Security Vendor is Not Telling You

    Bob Klein, Ryan Peters
    Thu, 11:00 - 11:50
    Mandalay Bay EF
  • From False Positives to Actionable Analysis: Behavioral Intrusion Detection Machine Learning and the SOC

    Joseph Zadeh
    Thu, 12:10 - 13:00
    Mandalay Bay EF
  • Automated Human Vulnerability Scanning with AVA

    Laura Bell
    Thu, 14:30 - 15:20
    Mandalay Bay EF
  • Advanced IC Reverse Engineering Techniques: In Depth Analysis of a Modern Smart Card

    Olivier Thomas
    Thu, 15:50 - 16:40
    Mandalay Bay EF
  • Most Ransomware Isnt as Complex as You Might Think

    Engin Kirda
    Thu, 17:00 - 17:25
    Mandalay Bay EF