• Wednesday, August 3
  • Can You Trust Me Now? An Exploration into the Mobile Threat Landscape

    Josh Thomas
    Wed, 10:20 - 11:10
    South Seas CDF
  • Applied Machine Learning for Data Exfil and Other Fun Topics

    Brian Wallace, Matt Wolff, Xuan Zhao
    Wed, 11:30 - 12:20
    South Seas CDF
  • CANSPY: A Platform for Auditing CAN Devices

    Jonathan-Christofer Demay, Arnaud Lebrun
    Wed, 13:50 - 14:40
    South Seas CDF
  • Recover a RSA Private Key from a TLS Session with Perfect Forward Secrecy

    Marco Ortisi
    Wed, 15:00 - 15:50
    South Seas CDF
  • Viral Video - Exploiting SSRF in Video Converters

    Nikolay Ermishkin, MaximAndreev
    Wed, 16:20 - 17:10
    South Seas CDF
  • Side-Channel Attacks on Everyday Applications

    Taylor Hornby
    Wed, 17:30 - 18:00
    South Seas CDF
  • Thursday, August 4
  • Blunting the Phisher's Spear: A Risk-Based Approach for Defining User Training and Awarding Administrative Privileges

    Arun Vishwanath
    Thu, 09:00 - 09:25
    South Seas CDF
  • Windows 10 Segment Heap Internals

    Mark Vincent Yason
    Thu, 09:45 - 10:35
    South Seas CDF
  • Language Properties of Phone Scammers: Cyberdefense at the Level of the Human

    Judith Tabron
    Thu, 11:00 - 11:50
    South Seas CDF
  • Horse Pill: A New Type of Linux Rootkit

    Michael Leibowitz
    Thu, 12:10 - 13:00
    South Seas CDF
  • Pangu 9 Internals

    Xiaobo Chen, Tielei Wang, Hao Xu
    Thu, 14:30 - 15:20
    South Seas CDF
  • Timing Attacks Have Never Been So Practical: Advanced Cross-Site Search Attacks

    Nethanel Gelernter
    Thu, 15:50 - 16:40
    South Seas CDF
  • Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud

    Aude Marzuoli
    Thu, 17:00 - 17:25
    South Seas CDF