• Wednesday, August 3
  • The Hidden Architecture of our Time: Why This Internet Worked How We Could Lose It and the Role Hackers Play

    Dan Kaminsky
    Wed, 09:00 - 10:00
    Lagoon K
  • Abusing Bleeding Edge Web Standards for AppSec Glory

    Ryan Lester, Bryant Zadegan
    Wed, 10:20 - 11:10
    Lagoon K
  • Hackproofing Oracle eBusiness Suite

    David Litchfield
    Wed, 11:30 - 12:20
    Lagoon K
  • Drone Attacks on Industrial Wireless: A New Front in Cyber Security

    Jeff Melrose
    Wed, 13:50 - 14:40
    Lagoon K
  • An Insider's Guide to Cyber-Insurance and Security Guarantees

    Jeremiah Grossman
    Wed, 15:00 - 15:50
    Lagoon K
  • Design Approaches for Security Automation

    Peleus Uhley
    Wed, 16:20 - 17:10
    Lagoon K
  • Watching Commodity Malware Get Sold to a Targeted Actor

    Israel Barak
    Wed, 17:30 - 18:00
    Lagoon K
  • Thursday, August 4
  • Dark Side of the DNS Force

    Erik Wu
    Thu, 09:00 - 09:25
    Lagoon K
  • CANCELLED - How to Build the Immune System for the Internet

    Xiaodun Fang
    Thu, 09:00 - 09:25
    Lagoon K
  • The Remote Malicious Butler Did It!

    Tal Be'ery, Chaim Hoch
    Thu, 09:45 - 10:35
    Lagoon K
  • Demystifying the Secure Enclave Processor

    Tarjei Mandt, Mathew Solnik
    Thu, 11:00 - 11:50
    Lagoon K
  • Hardening AWS Environments and Automating Incident Response for AWS Compromises

    Andrew Krug, Alex McCormack
    Thu, 12:10 - 13:00
    Lagoon K
  • Iran's Soft-War for Internet Dominance

    CollinAnderson, Claudio Guarnieri
    Thu, 14:30 - 15:20
    Lagoon K
  • Breaking Hardware-Enforced Security with Hypervisors

    Joseph Sharkey
    Thu, 15:50 - 16:40
    Lagoon K
  • An AI Approach to Malware Similarity Analysis: Mapping the Malware Genome With a Deep Neural Network

    Konstantin Berlin
    Thu, 17:00 - 17:25
    Lagoon K