• Wednesday, August 3
  • The Linux Kernel Hidden Inside Windows 10

    Alex Ionescu
    Wed, 10:20 - 11:10
    Mandalay Bay EF
  • $hell on Earth: From Browser to System Compromise

    Abdul-Aziz Hariri, JasielSpelman, Matt Molinyawe, Joshua Smith
    Wed, 11:30 - 12:20
    Mandalay Bay EF
  • Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools

    Wesley McGrew
    Wed, 13:50 - 14:40
    Mandalay Bay EF
  • Does Dropping USB Drives in Parking Lots and Other Places Really Work?

    Elie Bursztein
    Wed, 15:00 - 15:50
    Mandalay Bay EF
  • Access Keys Will Kill You Before You Kill the Password

    Loic Simon
    Wed, 16:20 - 16:45
    Mandalay Bay EF
  • Unleash the Infection Monkey: A Modern Alternative to Pen-Tests

    Ofri Ziv
    Wed, 17:30 - 18:00
    Mandalay Bay EF
  • Thursday, August 4
  • BadTunnel: How Do I Get Big Brother Power?

    Yang Yu
    Thu, 09:00 - 09:25
    Mandalay Bay EF
  • TCP Injection Attacks in the Wild - A Large Scale Study

    Gabi Nakibly
    Thu, 09:45 - 10:35
    Mandalay Bay EF
  • Investigating DDOS - Architecture Actors and Attribution

    AndreCorrea, Elliott Peterson
    Thu, 11:00 - 11:50
    Mandalay Bay EF
  • When the Cops Come A-Knocking: Handling Technical Assistance Demands from Law Enforcement

    Jennifer Granick, RianaPfefferkorn
    Thu, 12:10 - 13:00
    Mandalay Bay EF
  • Bad for Enterprise: Attacking BYOD Enterprise Mobile Security Solutions

    Vincent Tan
    Thu, 14:30 - 15:20
    Mandalay Bay EF
  • When Governments Attack: State Sponsored Malware Attacks Against Activists Lawyers and Journalists

    Eva Galperin, Cooper Quintin
    Thu, 15:50 - 16:40
    Mandalay Bay EF
  • Pay No Attention to That Hacker Behind the Curtain: A Look Inside the Black Hat Network

    Bart Stump, Neil Wyler
    Thu, 17:00 - 17:50
    Mandalay Bay EF