• Wednesday, August 3
  • Augmenting Static Analysis Using Pintool: Ablation

    Paul Mehta
    Wed, 10:20 - 11:10
    South Seas IJ
  • Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS

    Hanno Böck, Sean Devlin, PhilippJovanovic, Aaron Zauner
    Wed, 11:30 - 12:20
    South Seas IJ
  • Certificate Bypass: Hiding and Executing Malware from a Digitally Signed Executable

    Tom Nipravsky
    Wed, 13:50 - 14:15
    South Seas IJ
  • Into The Core - In-Depth Exploration of Windows 10 IoT Core

    Paul Sabanal
    Wed, 15:00 - 15:50
    South Seas IJ
  • Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX

    Yeongjin Jang, Taesoo Kim, Sangho Lee
    Wed, 16:20 - 17:10
    South Seas IJ
  • The Risk from Power Lines: How to Sniff the G3 and Prime Data and Detect the Interfere Attack

    Lei Ji, Yunding Jian
    Wed, 17:30 - 18:00
    South Seas IJ
  • Thursday, August 4
  • Keystone Engine: Next Generation Assembler Framework

    Nguyen Anh Quynh
    Thu, 09:00 - 09:25
    South Seas IJ
  • HTTP Cookie Hijacking in the Wild: Security and Privacy Implications

    JasonPolakis, Suphannee Sivakorn
    Thu, 09:45 - 10:35
    South Seas IJ
  • Cunning with CNG: Soliciting Secrets from Schannel

    Jake Kambic
    Thu, 11:00 - 11:50
    South Seas IJ
  • AirBnBeware: Short Term Rentals Long Term Pwnage

    Jeremy Galloway
    Thu, 12:10 - 13:00
    South Seas IJ
  • PLC-Blaster: A Worm Living Solely in the PLC

    HendrikSchwartke, MaikBrüggemann, Ralf Spenneberg
    Thu, 14:30 - 15:20
    South Seas IJ
  • Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic

    JonathanMayer, Travis LeBlanc
    Thu, 15:50 - 16:40
    South Seas IJ
  • Building Trust & Enabling Innovation for Voice Enabled IoT

    Lynn Terwoerds
    Thu, 17:00 - 17:25
    South Seas IJ