• Wednesday, August 5
  • Why Security Data Science Matters and How Its Different: Pitfalls and Promises of Data Science Based Breach Detection and Threat Intelligence

    Joshua Saxe
    Wed, 10:20 - 12:20
    South Seas CDF
  • Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorers Isolated Heap and MemoryProtection

    Brian Gorenc, Abdul-Aziz Hariri, Simon Zuckerbraun
    Wed, 13:50 - 14:40
    South Seas CDF
  • Switches Get Stitches

    Colin Cassidy, Robert M. Lee, Éireann Leverett
    Wed, 15:00 - 15:50
    South Seas CDF
  • Securing Your Big Data Environment

    Ajit Gaddam
    Wed, 16:20 - 17:10
    South Seas CDF
  • Attacking ECMAScript Engines with Redefinition

    Natalie Silvanovich
    Wed, 17:30 - 18:00
    South Seas CDF
  • Thursday, August 6
  • My Bro the ELK: Obtaining Context from Security Events

    Travis Smith
    Thu, 09:00 - 09:25
    South Seas CDF
  • Certifi-gate: Front-Door Access to Pwning Millions of Androids

    Avi Bashan, Ohad Bobrov
    Thu, 09:45 - 10:35
    South Seas CDF
  • Return to Where? You Cant Exploit What You Cant Find

    Stephen Crane, Andrei Homescu, Christopher Liebchen, Ahmad-Reza Sadeghi
    Thu, 11:00 - 11:50
    South Seas CDF
  • Bypass Control Flow Guard Comprehensively

    Yunhai Zhang
    Thu, 12:10 - 13:00
    South Seas CDF
  • Assessing and Exploiting BigNum Vulnerabilities

    Ralf-Philipp Weinmann
    Thu, 14:30 - 15:20
    South Seas CDF
  • HI THIS IS URGENT PLZ FIX ASAP: Critical Vulnerabilities and Bug Bounty Programs

    Kymberlee Price
    Thu, 15:50 - 16:40
    South Seas CDF
  • Hidden Risks of Biometric Identifiers and How to Avoid Them

    Tom Keenan
    Thu, 17:00 - 18:00
    South Seas CDF