• 1
  • 1000 Ways to Die in Mobile OAuth

    Eric Chen, Shuo Chen, Robert Kotcher, Patrick Tague, Yuan Tian, YutongPei
    Wed, 15:00 - 15:50
    South Seas ABE
  • A
  • Abusing Bleeding Edge Web Standards for AppSec Glory

    Ryan Lester, Bryant Zadegan
    Wed, 10:20 - 11:10
    Lagoon K
  • Access Keys Will Kill You Before You Kill the Password

    Loic Simon
    Wed, 16:20 - 16:45
    Mandalay Bay EF
  • Account Jumping Post Infection Persistency & Lateral Movement in AWS

    Dan Amiga, Dor Knafo
    Wed, 16:20 - 17:10
    Mandalay Bay GH
  • Adaptive Kernel Live Patching: An Open Collaborative Effort to Ameliorate Android N-Day Root Exploits

    Tao Wei, Yulong Zhang
    Wed, 13:50 - 14:40
    Jasmine Ballroom
  • Advanced CAN Injection Techniques for Vehicle Networks

    ChrisValasek, Charlie Miller
    Thu, 09:45 - 10:35
    Mandalay Bay GH
  • AirBnBeware: Short Term Rentals Long Term Pwnage

    Jeremy Galloway
    Thu, 12:10 - 13:00
    South Seas IJ
  • A Journey from JNDI/LDAP Manipulation to Remote Code Execution Dream Land

    Oleksandr Mirosh, Alvaro Munoz
    Wed, 11:30 - 12:20
    Jasmine Ballroom
  • A Lightbulb Worm?

    Colin O'Flynn
    Thu, 09:00 - 09:25
    Mandalay Bay BCD
  • AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It

    Nikhil Mittal
    Wed, 15:00 - 15:50
    Mandalay Bay GH
  • An AI Approach to Malware Similarity Analysis: Mapping the Malware Genome With a Deep Neural Network

    Konstantin Berlin
    Thu, 17:00 - 17:25
    Lagoon K
  • Analysis of the Attack Surface of Windows 10 Virtualization-Based Security

    Rafal Wojtczuk
    Thu, 11:00 - 11:50
    Mandalay Bay GH
  • An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems

    Patrick Gage Kelley
    Thu, 17:00 - 17:25
    Mandalay Bay BCD
  • An Insider's Guide to Cyber-Insurance and Security Guarantees

    Jeremiah Grossman
    Wed, 15:00 - 15:50
    Lagoon K
  • Applied Machine Learning for Data Exfil and Other Fun Topics

    Brian Wallace, Matt Wolff, Xuan Zhao
    Wed, 11:30 - 12:20
    South Seas CDF
  • A Retrospective on the Use of Export Cryptography

    David Adrian
    Wed, 10:20 - 11:10
    South Seas GH
  • Attacking SDN Infrastructure: Are We Ready for the Next-Gen Networking?

    Seungsoo Lee, Changhoon Yoon
    Thu, 17:00 - 17:25
    Mandalay Bay GH
  • Augmenting Static Analysis Using Pintool: Ablation

    Paul Mehta
    Wed, 10:20 - 11:10
    South Seas IJ
  • AVLeak: Fingerprinting Antivirus Emulators for Advanced Malware Evasion

    Alex Bulazel
    Wed, 17:30 - 18:00
    South Seas GH
  • B
  • Bad for Enterprise: Attacking BYOD Enterprise Mobile Security Solutions

    Vincent Tan
    Thu, 14:30 - 15:20
    Mandalay Bay EF
  • BadTunnel: How Do I Get Big Brother Power?

    Yang Yu
    Thu, 09:00 - 09:25
    Mandalay Bay EF
  • badWPAD

    Maxim Goncharov
    Thu, 12:10 - 12:35
    Mandalay Bay BCD
  • Behind The Scenes of iOS Security

    Ivan Krstic
    Thu, 15:50 - 16:40
    Mandalay Bay GH
  • Beyond the MCSE: Active Directory for the Security Professional

    Sean Metcalf
    Wed, 10:20 - 11:10
    Mandalay Bay GH
  • Blunting the Phisher's Spear: A Risk-Based Approach for Defining User Training and Awarding Administrative Privileges

    Arun Vishwanath
    Thu, 09:00 - 09:25
    South Seas CDF
  • Breaking FIDO: Are Exploits in There?

    Jerrod Chong
    Thu, 14:30 - 14:55
    South Seas GH
  • Breaking Hardware-Enforced Security with Hypervisors

    Joseph Sharkey
    Thu, 15:50 - 16:40
    Lagoon K
  • Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX

    Yeongjin Jang, Taesoo Kim, Sangho Lee
    Wed, 16:20 - 17:10
    South Seas IJ
  • Breaking Payment Points of Interaction (POI)

    Nir Valtman, Patrick Watson
    Wed, 10:20 - 11:10
    Mandalay Bay BCD
  • Brute-Forcing Lockdown Harddrive PIN Codes

    Colin O'Flynn
    Wed, 17:30 - 18:00
    Jasmine Ballroom
  • Building a Product Security Incident Response Team: Learnings from the Hivemind

    Kymberlee Price
    Wed, 17:30 - 18:00
    Mandalay Bay BCD
  • Building Trust & Enabling Innovation for Voice Enabled IoT

    Lynn Terwoerds
    Thu, 17:00 - 17:25
    South Seas IJ
  • C
  • Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud

    Aude Marzuoli
    Thu, 17:00 - 17:25
    South Seas CDF
  • CANCELLED - How to Build the Immune System for the Internet

    Xiaodun Fang
    Thu, 09:00 - 09:25
    Lagoon K
  • CANSPY: A Platform for Auditing CAN Devices

    Jonathan-Christofer Demay, Arnaud Lebrun
    Wed, 13:50 - 14:40
    South Seas CDF
  • Can You Trust Me Now? An Exploration into the Mobile Threat Landscape

    Josh Thomas
    Wed, 10:20 - 11:10
    South Seas CDF
  • Captain Hook: Pirating AVs to Bypass Exploit Mitigations

    Tomer Bitton, Udi Yavo
    Wed, 16:20 - 17:10
    Jasmine Ballroom
  • Capturing 0day Exploits with PERFectly Placed Hardware Traps

    Kenneth Fitch, Cody Pierce, Matt Spisak
    Wed, 10:20 - 11:10
    Jasmine Ballroom
  • Certificate Bypass: Hiding and Executing Malware from a Digitally Signed Executable

    Tom Nipravsky
    Wed, 13:50 - 14:15
    South Seas IJ
  • Crippling HTTPS with Unholy PAC

    Amit Klein, Itzik Kotler
    Wed, 16:20 - 17:10
    Mandalay Bay BCD
  • Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic

    JonathanMayer, Travis LeBlanc
    Thu, 15:50 - 16:40
    South Seas IJ
  • Cunning with CNG: Soliciting Secrets from Schannel

    Jake Kambic
    Thu, 11:00 - 11:50
    South Seas IJ
  • Cyber War in Perspective: Analysis from the Crisis in Ukraine

    Kenneth Geers
    Wed, 17:30 - 18:00
    South Seas ABE
  • D
  • Dangerous Hare: Hanging Attribute References Hazards Due to Vendor Customization

    Nan Zhang
    Thu, 17:00 - 17:25
    South Seas GH
  • Dark Side of the DNS Force

    Erik Wu
    Thu, 09:00 - 09:25
    Lagoon K
  • Defense at Hyperscale: Technologies and Policies for a Defensible Cyberspace

    Jason Healey
    Thu, 09:45 - 10:35
    South Seas GH
  • Demystifying the Secure Enclave Processor

    Tarjei Mandt, Mathew Solnik
    Thu, 11:00 - 11:50
    Lagoon K
  • Design Approaches for Security Automation

    Peleus Uhley
    Wed, 16:20 - 17:10
    Lagoon K
  • Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf

    Xiaolong Bai, Luyi Xing
    Thu, 12:10 - 13:00
    Jasmine Ballroom
  • Does Dropping USB Drives in Parking Lots and Other Places Really Work?

    Elie Bursztein
    Wed, 15:00 - 15:50
    Mandalay Bay EF
  • DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes

    Rodrigo Rubira Branco, RohitMothe
    Thu, 15:50 - 16:40
    South Seas GH
  • Drone Attacks on Industrial Wireless: A New Front in Cyber Security

    Jeff Melrose
    Wed, 13:50 - 14:40
    Lagoon K
  • Dungeons Dragons and Security

    Tiphaine Romand Latapie
    Thu, 09:00 - 09:25
    Mandalay Bay GH
  • E
  • Exploiting Curiosity and Context: How to Make People Click on a Dangerous Link Despite Their Security Awareness

    Zinaida Benenson
    Wed, 11:30 - 12:20
    South Seas ABE
  • G
  • GATTacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool

    Slawomir Jasek
    Wed, 13:50 - 14:15
    South Seas GH
  • GreatFET: Making GoodFET Great Again

    Michael Ossmann
    Wed, 16:20 - 17:10
    South Seas GH
  • H
  • Hacking Next-Gen ATMs: From Capture to Cashout

    Weston Hecker
    Thu, 11:00 - 11:50
    South Seas ABE
  • Hackproofing Oracle eBusiness Suite

    David Litchfield
    Wed, 11:30 - 12:20
    Lagoon K
  • Hardening AWS Environments and Automating Incident Response for AWS Compromises

    Andrew Krug, Alex McCormack
    Thu, 12:10 - 13:00
    Lagoon K
  • HEIST: HTTP Encrypted Information can be Stolen Through TCP-Windows

    Tom Van Goethem, MathyVanhoef
    Wed, 13:50 - 14:40
    South Seas ABE
  • $
  • $hell on Earth: From Browser to System Compromise

    Abdul-Aziz Hariri, JasielSpelman, Matt Molinyawe, Joshua Smith
    Wed, 11:30 - 12:20
    Mandalay Bay EF
  • H
  • Horse Pill: A New Type of Linux Rootkit

    Michael Leibowitz
    Thu, 12:10 - 13:00
    South Seas CDF
  • HTTP/2 & QUIC - Teaching Good Protocols To Do Bad Things

    Catherine Pearce, Carl Vincent
    Wed, 10:20 - 11:10
    South Seas ABE
  • HTTP Cookie Hijacking in the Wild: Security and Privacy Implications

    JasonPolakis, Suphannee Sivakorn
    Thu, 09:45 - 10:35
    South Seas IJ
  • I
  • I Came to Drop Bombs: Auditing the Compression Algorithm Weapon Cache

    Cara Marie
    Wed, 15:00 - 15:25
    South Seas GH
  • Into The Core - In-Depth Exploration of Windows 10 IoT Core

    Paul Sabanal
    Wed, 15:00 - 15:50
    South Seas IJ
  • Intra-Process Memory Protection for Applications on ARM and x86: Leveraging the ELF ABI

    Julian Bangert, Sergey Bratus, Maxwell Koo
    Wed, 15:00 - 15:50
    Jasmine Ballroom
  • Investigating DDOS - Architecture Actors and Attribution

    AndreCorrea, Elliott Peterson
    Thu, 11:00 - 11:50
    Mandalay Bay EF
  • Iran's Soft-War for Internet Dominance

    CollinAnderson, Claudio Guarnieri
    Thu, 14:30 - 15:20
    Lagoon K
  • K
  • Keystone Engine: Next Generation Assembler Framework

    Nguyen Anh Quynh
    Thu, 09:00 - 09:25
    South Seas IJ
  • L
  • Language Properties of Phone Scammers: Cyberdefense at the Level of the Human

    Judith Tabron
    Thu, 11:00 - 11:50
    South Seas CDF
  • M
  • Measuring Adversary Costs to Exploit Commercial Software: The Government- Bootstrapped Non-Profit C.I.T.L.

    Mudge ., Sarah Zatko
    Wed, 11:30 - 12:20
    South Seas GH
  • Memory Forensics Using Virtual Machine Introspection for Cloud Computing

    Tobias Zillner
    Wed, 11:30 - 11:55
    Mandalay Bay BCD
  • N
  • Next-Generation of Exploit Kit Detection by Building Simulated Obfuscators

    Xing Jin, Tongbo Luo
    Thu, 11:00 - 11:25
    Mandalay Bay BCD
  • Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS

    Hanno Böck, Sean Devlin, PhilippJovanovic, Aaron Zauner
    Wed, 11:30 - 12:20
    South Seas IJ
  • O
  • O-checker: Detection of Malicious Documents Through Deviation from File Format Specifications

    Yuhei Otsubo
    Thu, 11:00 - 11:25
    Jasmine Ballroom
  • OSS Security Maturity: Time to Put On Your Big Boy Pants!

    Christine Gadsby, Jake Kouns
    Thu, 14:30 - 15:20
    Jasmine Ballroom
  • Ouroboros: Tearing Xen Hypervisor with the Snake

    Shangcong Luan
    Thu, 09:45 - 10:10
    Mandalay Bay BCD
  • Over the Edge: Silently Owning Windows 10's Secure Browser

    Herbert Bos, Erik Bosman, Cristiano Giuffrida, Kaveh Razavi
    Thu, 17:00 - 17:50
    Jasmine Ballroom
  • P
  • Pangu 9 Internals

    Xiaobo Chen, Tielei Wang, Hao Xu
    Thu, 14:30 - 15:20
    South Seas CDF
  • Pay No Attention to That Hacker Behind the Curtain: A Look Inside the Black Hat Network

    Bart Stump, Neil Wyler
    Thu, 17:00 - 17:50
    Mandalay Bay EF
  • PINdemonium: A DBI-Based Generic Unpacker for Windows Executable

    LorenzoFontana, Sebastiano Mariani
    Thu, 09:00 - 09:25
    Jasmine Ballroom
  • PLC-Blaster: A Worm Living Solely in the PLC

    HendrikSchwartke, MaikBrüggemann, Ralf Spenneberg
    Thu, 14:30 - 15:20
    South Seas IJ
  • Pwning Your Java Messaging with Deserialization Vulnerabilities

    Matthias Kaiser
    Wed, 15:00 - 15:50
    Mandalay Bay BCD
  • R
  • Recover a RSA Private Key from a TLS Session with Perfect Forward Secrecy

    Marco Ortisi
    Wed, 15:00 - 15:50
    South Seas CDF
  • S
  • Samsung Pay: Tokenized Numbers Flaws and Issues

    Salvador Mendoza
    Thu, 09:00 - 09:25
    South Seas ABE
  • Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools

    Wesley McGrew
    Wed, 13:50 - 14:40
    Mandalay Bay EF
  • Security Through Design - Making Security Better by Designing for People

    Jelle Niemantsverdriet
    Wed, 17:30 - 18:00
    Mandalay Bay GH
  • SGX Secure Enclaves in Practice: Security and Crypto Review

    Jean-Philippe Aumasson, LuisMerino
    Thu, 12:10 - 13:00
    South Seas GH
  • Side-Channel Attacks on Everyday Applications

    Taylor Hornby
    Wed, 17:30 - 18:00
    South Seas CDF
  • Subverting Apple Graphics: Practical Approaches to Remotely Gaining Root

    Liang Chen, Marco Grassi, Qidan He, YubinFu
    Wed, 11:30 - 12:20
    Mandalay Bay GH
  • T
  • TCP Injection Attacks in the Wild - A Large Scale Study

    Gabi Nakibly
    Thu, 09:45 - 10:35
    Mandalay Bay EF
  • The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android

    Nick Kralevich
    Thu, 09:45 - 10:35
    South Seas ABE
  • The Art of Reverse Engineering Flash Exploits

    Jeongwook Oh
    Thu, 15:50 - 16:40
    Jasmine Ballroom
  • The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM

    Ralf Hund
    Thu, 15:50 - 16:40
    Mandalay Bay BCD
  • The Hidden Architecture of our Time: Why This Internet Worked How We Could Lose It and the Role Hackers Play

    Dan Kaminsky
    Wed, 09:00 - 10:00
    Lagoon K
  • The Linux Kernel Hidden Inside Windows 10

    Alex Ionescu
    Wed, 10:20 - 11:10
    Mandalay Bay EF
  • The Remote Malicious Butler Did It!

    Tal Be'ery, Chaim Hoch
    Thu, 09:45 - 10:35
    Lagoon K
  • The Risk from Power Lines: How to Sniff the G3 and Prime Data and Detect the Interfere Attack

    Lei Ji, Yunding Jian
    Wed, 17:30 - 18:00
    South Seas IJ
  • The Tao of Hardware the Te of Implants

    Joe FitzPatrick
    Thu, 11:00 - 11:50
    South Seas GH
  • The Year in Flash

    Natalie Silvanovich
    Thu, 14:30 - 15:20
    Mandalay Bay BCD
  • Timing Attacks Have Never Been So Practical: Advanced Cross-Site Search Attacks

    Nethanel Gelernter
    Thu, 15:50 - 16:40
    South Seas CDF
  • Towards a Holistic Approach in Building Intelligence to Fight Crimeware

    Dhia Mahjoub, Thomas Mathew, Mykhailo Sakaly
    Wed, 13:50 - 14:40
    Mandalay Bay BCD
  • U
  • Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages

    Anirudh Duggal
    Thu, 09:45 - 10:35
    Jasmine Ballroom
  • Unleash the Infection Monkey: A Modern Alternative to Pen-Tests

    Ofri Ziv
    Wed, 17:30 - 18:00
    Mandalay Bay EF
  • Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency

    Sean Malone
    Thu, 15:50 - 16:40
    South Seas ABE
  • Using EMET to Disable EMET

    Abdulellah Alsaheel, RaghavPande
    Wed, 16:20 - 17:10
    South Seas ABE
  • Using Undocumented CPU Behavior to See into Kernel Mode and Break KASLR in the Process

    Anders Fogh, Daniel Gruss
    Thu, 17:00 - 17:50
    South Seas ABE
  • V
  • Viral Video - Exploiting SSRF in Video Converters

    Nikolay Ermishkin, MaximAndreev
    Wed, 16:20 - 17:10
    South Seas CDF
  • VOIP WARS: The Phreakers Awaken

    Fatih Ozavci
    Thu, 14:30 - 15:20
    Mandalay Bay GH
  • W
  • Watching Commodity Malware Get Sold to a Targeted Actor

    Israel Barak
    Wed, 17:30 - 18:00
    Lagoon K
  • Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter

    John Seymour, Philip Tully
    Thu, 12:10 - 13:00
    South Seas ABE
  • Web Application Firewalls: Analysis of Detection Logic

    Vladimir Ivanov
    Thu, 14:30 - 15:20
    South Seas ABE
  • What's the DFIRence for ICS?

    JoshTriplett, Chris Sistrunk
    Thu, 09:00 - 09:25
    South Seas GH
  • When Governments Attack: State Sponsored Malware Attacks Against Activists Lawyers and Journalists

    Eva Galperin, Cooper Quintin
    Thu, 15:50 - 16:40
    Mandalay Bay EF
  • When the Cops Come A-Knocking: Handling Technical Assistance Demands from Law Enforcement

    Jennifer Granick, RianaPfefferkorn
    Thu, 12:10 - 13:00
    Mandalay Bay EF
  • Windows 10 Mitigation Improvements

    Matt Miller, David Weston
    Thu, 12:10 - 13:00
    Mandalay Bay GH
  • Windows 10 Segment Heap Internals

    Mark Vincent Yason
    Thu, 09:45 - 10:35
    South Seas CDF
  • X
  • Xenpwn: Breaking Paravirtualized Devices

    Felix Wilhelm
    Wed, 13:50 - 14:40
    Mandalay Bay GH