• Wednesday, August 3
  • Beyond the MCSE: Active Directory for the Security Professional

    Sean Metcalf
    Wed, 10:20 - 11:10
    Mandalay Bay GH
  • Subverting Apple Graphics: Practical Approaches to Remotely Gaining Root

    Liang Chen, Marco Grassi, Qidan He, YubinFu
    Wed, 11:30 - 12:20
    Mandalay Bay GH
  • Xenpwn: Breaking Paravirtualized Devices

    Felix Wilhelm
    Wed, 13:50 - 14:40
    Mandalay Bay GH
  • AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It

    Nikhil Mittal
    Wed, 15:00 - 15:50
    Mandalay Bay GH
  • Account Jumping Post Infection Persistency & Lateral Movement in AWS

    Dan Amiga, Dor Knafo
    Wed, 16:20 - 17:10
    Mandalay Bay GH
  • Security Through Design - Making Security Better by Designing for People

    Jelle Niemantsverdriet
    Wed, 17:30 - 18:00
    Mandalay Bay GH
  • Thursday, August 4
  • Dungeons Dragons and Security

    Tiphaine Romand Latapie
    Thu, 09:00 - 09:25
    Mandalay Bay GH
  • Advanced CAN Injection Techniques for Vehicle Networks

    ChrisValasek, Charlie Miller
    Thu, 09:45 - 10:35
    Mandalay Bay GH
  • Analysis of the Attack Surface of Windows 10 Virtualization-Based Security

    Rafal Wojtczuk
    Thu, 11:00 - 11:50
    Mandalay Bay GH
  • Windows 10 Mitigation Improvements

    Matt Miller, David Weston
    Thu, 12:10 - 13:00
    Mandalay Bay GH
  • VOIP WARS: The Phreakers Awaken

    Fatih Ozavci
    Thu, 14:30 - 15:20
    Mandalay Bay GH
  • Behind The Scenes of iOS Security

    Ivan Krstic
    Thu, 15:50 - 16:40
    Mandalay Bay GH
  • Attacking SDN Infrastructure: Are We Ready for the Next-Gen Networking?

    Seungsoo Lee, Changhoon Yoon
    Thu, 17:00 - 17:25
    Mandalay Bay GH