• Wednesday, August 3
  • Breaking Payment Points of Interaction (POI)

    Nir Valtman, Patrick Watson
    Wed, 10:20 - 11:10
    Mandalay Bay BCD
  • Memory Forensics Using Virtual Machine Introspection for Cloud Computing

    Tobias Zillner
    Wed, 11:30 - 11:55
    Mandalay Bay BCD
  • Towards a Holistic Approach in Building Intelligence to Fight Crimeware

    Dhia Mahjoub, Thomas Mathew, Mykhailo Sakaly
    Wed, 13:50 - 14:40
    Mandalay Bay BCD
  • Pwning Your Java Messaging with Deserialization Vulnerabilities

    Matthias Kaiser
    Wed, 15:00 - 15:50
    Mandalay Bay BCD
  • Crippling HTTPS with Unholy PAC

    Amit Klein, Itzik Kotler
    Wed, 16:20 - 17:10
    Mandalay Bay BCD
  • Building a Product Security Incident Response Team: Learnings from the Hivemind

    Kymberlee Price
    Wed, 17:30 - 18:00
    Mandalay Bay BCD
  • Thursday, August 4
  • A Lightbulb Worm?

    Colin O'Flynn
    Thu, 09:00 - 09:25
    Mandalay Bay BCD
  • Ouroboros: Tearing Xen Hypervisor with the Snake

    Shangcong Luan
    Thu, 09:45 - 10:10
    Mandalay Bay BCD
  • Next-Generation of Exploit Kit Detection by Building Simulated Obfuscators

    Xing Jin, Tongbo Luo
    Thu, 11:00 - 11:25
    Mandalay Bay BCD
  • badWPAD

    Maxim Goncharov
    Thu, 12:10 - 12:35
    Mandalay Bay BCD
  • The Year in Flash

    Natalie Silvanovich
    Thu, 14:30 - 15:20
    Mandalay Bay BCD
  • The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM

    Ralf Hund
    Thu, 15:50 - 16:40
    Mandalay Bay BCD
  • An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems

    Patrick Gage Kelley
    Thu, 17:00 - 17:25
    Mandalay Bay BCD