• Wednesday, August 5
  • Unicorn: Next Generation CPU Emulator Framework

    Hoang-Vu Dang, Nguyen Anh Quynh
    Wed, 10:20 - 11:10
    South Seas IJ
  • Understanding and Managing Entropy Usage

    Bruce Potter, Sasha Wood
    Wed, 11:30 - 12:20
    South Seas IJ
  • These are Not Your Grand Daddys CPU Performance Counters - CPU Hardware Performance Counters for Security

    Anders Fogh, Nishad Herath
    Wed, 13:50 - 14:40
    South Seas IJ
  • Stranger Danger! What is the Risk from 3rd Party Libraries?

    Jake Kouns
    Wed, 15:00 - 15:50
    South Seas IJ
  • Behind the Mask: The Agenda Tricks and Tactics of the Federal Trade Commission as they Regulate Cybersecurity

    Michael Daugherty
    Wed, 16:20 - 17:10
    South Seas IJ
  • THIS IS DeepERENT: Tracking App Behaviors with (Nothing Changed) Phone for Evasive Android Malware

    Jun Young Choi, Yeongung Park
    Wed, 17:30 - 18:00
    South Seas IJ
  • Thursday, August 6
  • Taxonomic Modeling of Security Threats in Software Defined Networking

    Jennia Hizver
    Thu, 09:00 - 09:25
    South Seas IJ
  • The Kali Linux Dojo Workshop #1: Rolling Your Own - Generating Custom Kali Linux 20 ISOs

    Mati Aharoni
    Thu, 09:45 - 10:35
    South Seas IJ
  • The Kali Linux Dojo Workshop #2: Kali USB Setups with Persistent Stores and LUKS Nuke Support

     
    Thu, 11:00 - 11:50
    South Seas IJ
  • BGP Stream

    Dan Hubbard, Andree Toonk
    Thu, 12:10 - 13:00
    South Seas IJ
  • Review and Exploit Neglected Attack Surfaces in iOS 8

    Xiaobo Chen, Tielei Wang, HAO XU
    Thu, 14:30 - 15:20
    South Seas IJ
  • Breaking Payloads with Runtime Code Stripping and Image Freezing

    Collin Mulliner, Matthias Neugschwandtner
    Thu, 15:50 - 16:40
    South Seas IJ
  • Dance Like Nobodys Watching Encrypt Like Everyone Is: A Peek Inside the Black Hat Network

    Bart Stump, Neil Wyler
    Thu, 17:00 - 18:00
    South Seas IJ