• Wednesday, August 3
  • A Retrospective on the Use of Export Cryptography

    David Adrian
    Wed, 10:20 - 11:10
    South Seas GH
  • Measuring Adversary Costs to Exploit Commercial Software: The Government- Bootstrapped Non-Profit C.I.T.L.

    Mudge ., Sarah Zatko
    Wed, 11:30 - 12:20
    South Seas GH
  • GATTacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool

    Slawomir Jasek
    Wed, 13:50 - 14:15
    South Seas GH
  • I Came to Drop Bombs: Auditing the Compression Algorithm Weapon Cache

    Cara Marie
    Wed, 15:00 - 15:25
    South Seas GH
  • GreatFET: Making GoodFET Great Again

    Michael Ossmann
    Wed, 16:20 - 17:10
    South Seas GH
  • AVLeak: Fingerprinting Antivirus Emulators for Advanced Malware Evasion

    Alex Bulazel
    Wed, 17:30 - 18:00
    South Seas GH
  • Thursday, August 4
  • What's the DFIRence for ICS?

    JoshTriplett, Chris Sistrunk
    Thu, 09:00 - 09:25
    South Seas GH
  • Defense at Hyperscale: Technologies and Policies for a Defensible Cyberspace

    Jason Healey
    Thu, 09:45 - 10:35
    South Seas GH
  • The Tao of Hardware the Te of Implants

    Joe FitzPatrick
    Thu, 11:00 - 11:50
    South Seas GH
  • SGX Secure Enclaves in Practice: Security and Crypto Review

    Jean-Philippe Aumasson, LuisMerino
    Thu, 12:10 - 13:00
    South Seas GH
  • Breaking FIDO: Are Exploits in There?

    Jerrod Chong
    Thu, 14:30 - 14:55
    South Seas GH
  • DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes

    Rodrigo Rubira Branco, RohitMothe
    Thu, 15:50 - 16:40
    South Seas GH
  • Dangerous Hare: Hanging Attribute References Hazards Due to Vendor Customization

    Nan Zhang
    Thu, 17:00 - 17:25
    South Seas GH