• A
  • Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorers Isolated Heap and MemoryProtection

    Brian Gorenc, Abdul-Aziz Hariri, Simon Zuckerbraun
    Wed, 13:50 - 14:40
    South Seas CDF
  • Abusing Windows Management Instrumentation (WMI) to Build a Persistent Asynchronous and Fileless Backdoor

    Matthew Graeber
    Wed, 16:20 - 17:10
    Mandalay Bay EF
  • Abusing XSLT for Practical Attacks

    Fernando Arnaboldi
    Thu, 15:50 - 16:40
    Lagoon K
  • Advanced IC Reverse Engineering Techniques: In Depth Analysis of a Modern Smart Card

    Olivier Thomas
    Thu, 15:50 - 16:40
    Mandalay Bay EF
  • Adventures in Femtoland: 350 Yuan for Invaluable Fun

    Alexey Osipov, Alexander Zaitsev
    Wed, 13:50 - 14:40
    Mandalay Bay BCD
  • Ah! Universal Android Rooting is Back

    Wen Xu
    Thu, 11:00 - 11:50
    Mandalay Bay GH
  • Android Security State of the Union

    Adrian Ludwig
    Wed, 10:20 - 11:10
    Mandalay Bay GH
  • API Deobfuscator: Resolving Obfuscated API Functions in Modern Packers

    Seokwoo Choi
    Thu, 17:00 - 18:00
    South Seas GH
  • Assessing and Exploiting BigNum Vulnerabilities

    Ralf-Philipp Weinmann
    Thu, 14:30 - 15:20
    South Seas CDF
  • Attacking ECMAScript Engines with Redefinition

    Natalie Silvanovich
    Wed, 17:30 - 18:00
    South Seas CDF
  • Attacking Hypervisors Using Firmware and Hardware

    Oleksandr Bazhaniuk, Yuriy Bulygin, Mikhail Gorobets, Alexander Matrosov
    Wed, 16:20 - 17:10
    Mandalay Bay GH
  • Attacking Interoperability - An OLE Edition

    Haifei Li, Bing Sun
    Wed, 11:30 - 12:20
    Mandalay Bay BCD
  • Attacking Your Trusted Core: Exploiting Trustzone on Android

    Di Shen
    Thu, 09:00 - 09:25
    Mandalay Bay EF
  • Automated Human Vulnerability Scanning with AVA

    Laura Bell
    Thu, 14:30 - 15:20
    Mandalay Bay EF
  • B
  • Back Doors and Front Doors Breaking the Unbreakable System

    James Denaro, Matthew Green
    Wed, 15:00 - 15:50
    South Seas ABE
  • Battle of the SKM and IUM: How Windows 10 Rewrites OS Architecture

    Alex Ionescu
    Thu, 09:45 - 10:35
    Jasmine Ballroom
  • Behind the Mask: The Agenda Tricks and Tactics of the Federal Trade Commission as they Regulate Cybersecurity

    Michael Daugherty
    Wed, 16:20 - 17:10
    South Seas IJ
  • BGP Stream

    Dan Hubbard, Andree Toonk
    Thu, 12:10 - 13:00
    South Seas IJ
  • Big Game Hunting: The Peculiarities of Nation-State Malware Research

    Claudio Guarnieri, Morgan Marquis-Boire, Marion Marschalek
    Wed, 15:00 - 15:50
    Mandalay Bay GH
  • Breaking Access Controls with BLEKey

    Mark Baseggio, Eric Evenchick
    Thu, 11:00 - 11:50
    Lagoon K
  • Breaking Honeypots for Fun and Profit

    Gadi Evron, Itamar Sher, Dean Sysman
    Thu, 12:10 - 13:00
    South Seas GH
  • Breaking HTTPS with BGP Hijacking

    Artyom Gavrichenkov
    Wed, 11:30 - 12:20
    Lagoon K
  • Breaking Payloads with Runtime Code Stripping and Image Freezing

    Collin Mulliner, Matthias Neugschwandtner
    Thu, 15:50 - 16:40
    South Seas IJ
  • Bring Back the Honeypots

    Haroon Meer, Marco Slaviero
    Wed, 10:20 - 11:10
    South Seas ABE
  • Bringing a Cannon to a Knife Fight

    Johannes Gilger, Adam Kozy
    Thu, 09:45 - 10:35
    South Seas ABE
  • Broadcasting Your Attack: Security Testing DAB Radio in Cars

    Andy Davis
    Thu, 14:30 - 15:20
    South Seas ABE
  • Bypass Control Flow Guard Comprehensively

    Yunhai Zhang
    Thu, 12:10 - 13:00
    South Seas CDF
  • Bypass Surgery Abusing Content Delivery Networks with Server-Side-Request Forgery (SSRF) Flash and DNS

    Michael Brooks, Matthew Bryant
    Thu, 09:45 - 10:35
    South Seas GH
  • C
  • Certifi-gate: Front-Door Access to Pwning Millions of Androids

    Avi Bashan, Ohad Bobrov
    Thu, 09:45 - 10:35
    South Seas CDF
  • Cloning 3G/4G SIM Cards with a PC and an Oscilloscope: Lessons Learned in Physical Security

    Yu Yu
    Wed, 17:30 - 18:00
    Mandalay Bay EF
  • Commercial Mobile Spyware - Detecting the Undetectable

    Joshua Dalman, Valerie Hantke
    Wed, 17:30 - 18:00
    Mandalay Bay GH
  • CrackLord: Maximizing Password Cracking Boxes

    Michael McAtee, Lucas Morris
    Thu, 09:00 - 09:25
    Lagoon K
  • Crash & Pay: How to Own and Clone Contactless Payment Devices

    Peter Fillmore
    Wed, 16:20 - 17:10
    South Seas ABE
  • D
  • Dance Like Nobodys Watching Encrypt Like Everyone Is: A Peek Inside the Black Hat Network

    Bart Stump, Neil Wyler
    Thu, 17:00 - 18:00
    South Seas IJ
  • Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing

    Alex Pinto, Alexandre Sieira
    Wed, 13:50 - 14:40
    Lagoon K
  • Deep Learning on Disassembly

    Andrew Davis, Matt Wolff
    Thu, 15:50 - 16:40
    South Seas ABE
  • Defeating Machine Learning: What Your Security Vendor is Not Telling You

    Bob Klein, Ryan Peters
    Thu, 11:00 - 11:50
    Mandalay Bay EF
  • Defeating Pass-the-Hash: Separation of Powers

    Seth Moore, Baris Saydag
    Wed, 11:30 - 12:20
    Mandalay Bay EF
  • Distributing the Reconstruction of High-Level Intermediate Representation for Large Scale Malware Analysis

    Gabriel Negreira Barbosa, Rodrigo Rubira Branco, Alexander Matrosov, Eugene Rodionov
    Wed, 15:00 - 15:50
    South Seas GH
  • Dom Flow - Untangling the DOM for More Easy-Juicy Bugs

    Ahamed Nafeez
    Thu, 17:00 - 18:00
    Jasmine Ballroom
  • E
  • Emanate Like a Boss: Generalized Covert Data Exfiltration with Funtenna

    Ang Cui
    Wed, 11:30 - 12:20
    Jasmine Ballroom
  • Exploiting Out-of-Order Execution for Covert Cross-VM Communication

    Sophia D'Antoine
    Thu, 17:00 - 17:25
    South Seas ABE
  • Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges

    Halvar Flake, Mark Seaborn
    Wed, 13:50 - 14:40
    Jasmine Ballroom
  • Exploiting XXE Vulnerabilities in File Parsing Functionality

    Will Vandevanter
    Thu, 09:00 - 09:25
    South Seas GH
  • F
  • Faux Disk Encryption: Realities of Secure Storage on Mobile Devices

    Daniel A. Mayer, Drew Suarez
    Wed, 16:20 - 17:10
    Lagoon K
  • FileCry - The New Age of XXE

    Sergey Gorbaty, Xiaoran Wang
    Thu, 17:00 - 18:00
    Mandalay Bay GH
  • Fingerprints on Mobile Devices: Abusing and Leaking

    Tao Wei, Yulong Zhang
    Thu, 12:10 - 13:00
    Mandalay Bay GH
  • Forging the USB Armory an Open Source Secure Flash-Drive-Sized Computer

    Andrea Barisani, Daniele Bianco
    Thu, 12:10 - 13:00
    Lagoon K
  • From False Positives to Actionable Analysis: Behavioral Intrusion Detection Machine Learning and the SOC

    Joseph Zadeh
    Thu, 12:10 - 13:00
    Mandalay Bay EF
  • Fuzzing Android System Services by Binder Call to Escalate Privilege

    Guang Gong
    Thu, 17:00 - 17:25
    Lagoon K
  • G
  • GameOver Zeus: Badguys and Backends

    Elliott Peterson, Michael Sandee, Tillmann Werner
    Wed, 13:50 - 14:40
    Mandalay Bay GH
  • Graphic Content Ahead: Towards Automated Scalable Analysis of Graphical Images Embedded in Malware

    Alex Long
    Wed, 17:30 - 18:00
    Mandalay Bay BCD
  • H
  • Harnessing Intelligence from Malware Repositories

    Arun Lakhotia, Vivek Notani
    Thu, 17:00 - 18:00
    Mandalay Bay BCD
  • Hidden Risks of Biometric Identifiers and How to Avoid Them

    Tom Keenan
    Thu, 17:00 - 18:00
    South Seas CDF
  • HI THIS IS URGENT PLZ FIX ASAP: Critical Vulnerabilities and Bug Bounty Programs

    Kymberlee Price
    Thu, 15:50 - 16:40
    South Seas CDF
  • How to Hack Government: Technologists as Policy Makers

    Terrell McSweeny, Ashkan Soltani
    Wed, 10:20 - 11:10
    Lagoon K
  • How to Implement IT Security After a Cyber Meltdown

    Christina Kubecka
    Thu, 11:00 - 11:50
    South Seas ABE
  • How Vulnerable are We to Scams?

    Markus Jakobsson, Ting-Fang Yen
    Wed, 17:30 - 18:00
    South Seas ABE
  • I
  • Information Access and Information Sharing: Where We are and Where We are Going

    Alejandro Mayorkas
    Thu, 12:10 - 13:00
    Mandalay Bay BCD
  • Internet-Facing PLCs - A New Back Orifice

    Johannes Klick, Stephan Lau, Jan-Ole Malchow, Daniel Marzin, Volker Roth
    Thu, 12:10 - 13:00
    Jasmine Ballroom
  • Internet Plumbing for Security Professionals: The State of BGP Security

    Wim Remes
    Wed, 10:20 - 11:10
    Mandalay Bay BCD
  • Internet-Scale File Analysis

    Zachary Hanif, Tamas Lengyel, George Webster
    Thu, 14:30 - 15:20
    Jasmine Ballroom
  • Is the NSA Still Listening to Your Phone Calls? A Surveillance Debate: Congressional Success or Epic Fail

    Jamil Jaffer, Mark Jaycox
    Thu, 14:30 - 15:20
    Mandalay Bay BCD
  • M
  • Mobile Point of Scam: Attacking the Square Reader

    Artem Losev, Alexandrea Mellen, John Moore
    Wed, 17:30 - 18:00
    South Seas GH
  • Most Ransomware Isnt as Complex as You Might Think

    Engin Kirda
    Thu, 17:00 - 17:25
    Mandalay Bay EF
  • My Bro the ELK: Obtaining Context from Security Events

    Travis Smith
    Thu, 09:00 - 09:25
    South Seas CDF
  • O
  • Optimized Fuzzing IOKit in iOS

    Lei Long, Aimin Pan, Peng Xiao
    Wed, 16:20 - 17:10
    Mandalay Bay BCD
  • P
  • Panel: Getting It Right: Straight Talk on Threat & Information Sharing

    Kevin Bankston, Rebekah Brown, Brian Engle, Trey Ford, Mark Hammell
    Wed, 16:20 - 17:10
    South Seas GH
  • Panel: How the Wassenaar Arrangements Export Control of Intrusion Software Affects the Security Industry

    Collin Anderson, Nate Cardozo, Adriel Desautels, Katie Moussouris, Kim Zetter, Dino Dai Zovi
    Thu, 11:00 - 11:50
    Mandalay Bay BCD
  • Pen Testing a City

    Greg Conti, Tom Cross, David Raymond
    Thu, 14:30 - 15:20
    Mandalay Bay GH
  • R
  • Red vs Blue: Modern Active Directory Attacks Detection and Protection

    Sean Metcalf
    Wed, 13:50 - 14:40
    Mandalay Bay EF
  • Remote Exploitation of an Unaltered Passenger Vehicle

    Charlie Miller, Christopher Valasek
    Wed, 15:00 - 15:50
    Mandalay Bay EF
  • Remote Physical Damage 101 - Bread and Butter Attacks

    Jason Larsen
    Thu, 09:00 - 09:25
    Mandalay Bay BCD
  • Repurposing OnionDuke: A Single Case Study Around Reusing Nation State Malware

    Joshua Pitts
    Thu, 09:45 - 10:35
    Mandalay Bay BCD
  • Return to Where? You Cant Exploit What You Cant Find

    Stephen Crane, Andrei Homescu, Christopher Liebchen, Ahmad-Reza Sadeghi
    Thu, 11:00 - 11:50
    South Seas CDF
  • Review and Exploit Neglected Attack Surfaces in iOS 8

    Xiaobo Chen, Tielei Wang, HAO XU
    Thu, 14:30 - 15:20
    South Seas IJ
  • Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion

    Marina Krotofil
    Thu, 15:50 - 16:40
    Mandalay Bay BCD
  • ROPInjector: Using Return Oriented Programming for Polymorphism and Antivirus Evasion

    Christoforos Ntantogian, Giorgos Poulios, Christos Xenakis
    Thu, 09:00 - 09:25
    South Seas ABE
  • S
  • Securing Your Big Data Environment

    Ajit Gaddam
    Wed, 16:20 - 17:10
    South Seas CDF
  • Server-Side Template Injection: RCE for the Modern Web App

    James Kettle
    Wed, 10:20 - 11:10
    Jasmine Ballroom
  • SMBv2: Sharing More than Just Your Files

    Hormazd Billimoria, Jonathan Brossard
    Wed, 13:50 - 14:40
    South Seas ABE
  • Social Engineering the Windows Kernel: Finding and Exploiting Token Handling Vulnerabilities

    James Forshaw
    Thu, 15:50 - 16:40
    Mandalay Bay GH
  • Spread Spectrum Satcom Hacking: Attacking the GlobalStar Simplex Data Service

    Colby Moore
    Wed, 10:20 - 11:10
    South Seas GH
  • Stagefright: Scary Code in the Heart of Android

    Joshua Drake
    Wed, 15:00 - 15:50
    Mandalay Bay BCD
  • Staying Persistent in Software Defined Networks

    Gregory Pickett
    Thu, 11:00 - 11:50
    South Seas GH
  • Stranger Danger! What is the Risk from 3rd Party Libraries?

    Jake Kouns
    Wed, 15:00 - 15:50
    South Seas IJ
  • Subverting Satellite Receivers for Botnet and Profit

    Sofiane Talmat
    Wed, 17:30 - 18:00
    Lagoon K
  • Switches Get Stitches

    Colin Cassidy, Robert M. Lee, Éireann Leverett
    Wed, 15:00 - 15:50
    South Seas CDF
  • T
  • Take a Hacker to Work Day - How Federal Prosecutors Use the CFAA

    Leonard Bailey
    Wed, 11:30 - 12:20
    South Seas ABE
  • Taking Event Correlation with You

    Rob King
    Thu, 11:00 - 11:50
    Jasmine Ballroom
  • Targeted Takedowns: Minimizing Collateral Damage Using Passive DNS

    Paul Vixie
    Wed, 15:00 - 15:50
    Jasmine Ballroom
  • Taxonomic Modeling of Security Threats in Software Defined Networking

    Jennia Hizver
    Thu, 09:00 - 09:25
    South Seas IJ
  • The Applications of Deep Learning on Traffic Identification

    Chuanming Huang, Bo Liu, Zhanyi Wang, Zhuo Zhang
    Thu, 09:00 - 09:25
    Jasmine Ballroom
  • The Battle for Free Speech on the Internet

    Matthew Prince
    Wed, 11:30 - 12:20
    South Seas GH
  • The Kali Linux Dojo Workshop #1: Rolling Your Own - Generating Custom Kali Linux 20 ISOs

    Mati Aharoni
    Thu, 09:45 - 10:35
    South Seas IJ
  • The Kali Linux Dojo Workshop #2: Kali USB Setups with Persistent Stores and LUKS Nuke Support

     
    Thu, 11:00 - 11:50
    South Seas IJ
  • The Lifecycle of a Revolution

    Jennifer Granick
    Wed, 09:00 - 10:00
    Mandalay Bay Ballroom
  • The Little Pump Gauge that Could: Attacks Against Gas Pump Monitoring Systems

    Stephen Hilt, Kyle Wilhoit
    Wed, 16:20 - 17:10
    Jasmine Ballroom
  • The Memory Sinkhole - Unleashing an x86 Design Flaw Allowing Universal Privilege Escalation

    Christopher Domas
    Thu, 09:45 - 10:35
    Mandalay Bay GH
  • The Nodejs Highway: Attacks are at Full Throttle

    Amit Ashbel, Maty Siman
    Wed, 17:30 - 18:00
    Jasmine Ballroom
  • The NSA Playset: A Year of Toys and Tools

    Michael Ossmann
    Thu, 09:45 - 10:35
    Mandalay Bay EF
  • These are Not Your Grand Daddys CPU Performance Counters - CPU Hardware Performance Counters for Security

    Anders Fogh, Nishad Herath
    Wed, 13:50 - 14:40
    South Seas IJ
  • The Tactical Application Security Program: Getting Stuff Done

    David Cintz, Cory Scott
    Wed, 13:50 - 14:40
    South Seas GH
  • THIS IS DeepERENT: Tracking App Behaviors with (Nothing Changed) Phone for Evasive Android Malware

    Jun Young Choi, Yeongung Park
    Wed, 17:30 - 18:00
    South Seas IJ
  • ThunderStrike 2: Sith Strike

    Trammel Hudson, Corey Kallenberg, Xeno Kovah
    Thu, 15:50 - 16:40
    Jasmine Ballroom
  • TrustKit: Code Injection on iOS 8 for the Greater Good

    Eric Castro, Angela On-kit Chow, Alban Diquet
    Thu, 09:00 - 09:25
    Mandalay Bay GH
  • U
  • Understanding and Managing Entropy Usage

    Bruce Potter, Sasha Wood
    Wed, 11:30 - 12:20
    South Seas IJ
  • Understanding the Attack Surface and Attack Resilience of Project Spartans New EdgeHTML Rendering Engine

    Mark Yason
    Thu, 14:30 - 15:20
    South Seas GH
  • Unicorn: Next Generation CPU Emulator Framework

    Hoang-Vu Dang, Nguyen Anh Quynh
    Wed, 10:20 - 11:10
    South Seas IJ
  • Using Static Binary Analysis to Find Vulnerabilities and Backdoors in Firmware

    Christopher Kruegel, Yan Shoshitaishvili
    Thu, 15:50 - 16:40
    South Seas GH
  • W
  • Web Timing Attacks Made Practical

    Jason Morgan, Timothy Morgan
    Thu, 09:45 - 10:35
    Lagoon K
  • When IoT Attacks: Hacking a Linux-Powered Rifle

    Michael Auger, Runa A. Sandvik
    Thu, 14:30 - 15:20
    Lagoon K
  • Why Security Data Science Matters and How Its Different: Pitfalls and Promises of Data Science Based Breach Detection and Threat Intelligence

    Joshua Saxe
    Wed, 10:20 - 12:20
    South Seas CDF
  • Winning the Online Banking War

    Sean Park
    Wed, 11:30 - 12:20
    Mandalay Bay GH
  • Writing Bad @$$ Malware for OS X

    Patrick Wardle
    Wed, 10:20 - 11:10
    Mandalay Bay EF
  • WSUSpect - Compromising the Windows Enterprise via Windows Update

    Alex Chapman, Paul Stone
    Wed, 15:00 - 15:50
    Lagoon K
  • Z
  • ZigBee Exploited the Good the Bad and the Ugly

    Sebastian Strobl, Tobias Zillner
    Thu, 12:10 - 13:00
    South Seas ABE