• Wednesday, August 3
  • HTTP/2 & QUIC - Teaching Good Protocols To Do Bad Things

    Catherine Pearce, Carl Vincent
    Wed, 10:20 - 11:10
    South Seas ABE
  • Exploiting Curiosity and Context: How to Make People Click on a Dangerous Link Despite Their Security Awareness

    Zinaida Benenson
    Wed, 11:30 - 12:20
    South Seas ABE
  • HEIST: HTTP Encrypted Information can be Stolen Through TCP-Windows

    Tom Van Goethem, MathyVanhoef
    Wed, 13:50 - 14:40
    South Seas ABE
  • 1000 Ways to Die in Mobile OAuth

    Eric Chen, Shuo Chen, Robert Kotcher, Patrick Tague, Yuan Tian, YutongPei
    Wed, 15:00 - 15:50
    South Seas ABE
  • Using EMET to Disable EMET

    Abdulellah Alsaheel, RaghavPande
    Wed, 16:20 - 17:10
    South Seas ABE
  • Cyber War in Perspective: Analysis from the Crisis in Ukraine

    Kenneth Geers
    Wed, 17:30 - 18:00
    South Seas ABE
  • Thursday, August 4
  • Samsung Pay: Tokenized Numbers Flaws and Issues

    Salvador Mendoza
    Thu, 09:00 - 09:25
    South Seas ABE
  • The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android

    Nick Kralevich
    Thu, 09:45 - 10:35
    South Seas ABE
  • Hacking Next-Gen ATMs: From Capture to Cashout

    Weston Hecker
    Thu, 11:00 - 11:50
    South Seas ABE
  • Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter

    John Seymour, Philip Tully
    Thu, 12:10 - 13:00
    South Seas ABE
  • Web Application Firewalls: Analysis of Detection Logic

    Vladimir Ivanov
    Thu, 14:30 - 15:20
    South Seas ABE
  • Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency

    Sean Malone
    Thu, 15:50 - 16:40
    South Seas ABE
  • Using Undocumented CPU Behavior to See into Kernel Mode and Break KASLR in the Process

    Anders Fogh, Daniel Gruss
    Thu, 17:00 - 17:50
    South Seas ABE