• Thursday, May 19
  • Deconstructing The Cyber Kill Chain of Angler Campaign

    Artisom Holub
    Thu, 10:00 - 10:40
    Library - Security & Technology
  • Emerald City of Cyber Security

    Ben Herzberg
    Thu, 10:50 - 11:30
    Library - Security & Technology
  • httpillage: calling all nodes

    John Poulin
    Thu, 11:40 - 12:20
    Library - Security & Technology
  • Why is Network Access Control So Hard? Is there a Better Way?

    Jason Garbis
    Thu, 13:20 - 14:00
    Library - Security & Technology
  • Side Channel Defense with Intel Cache Allocation Technique

    Xiaoning Li, Pei Luo
    Thu, 14:10 - 14:50
    Library - Security & Technology