• Friday, August 5
  • Feds and 0Days: From Before Heartbleed to After FBI-Apple

    Jason Healey
    Fri, 10:00 - 10:50
    Track One
  • Compelled Decryption - State of the Art in Doctrinal Perversions

    Ladar Levison
    Fri, 11:00 - 11:50
    Track One
  • Honey Onions: Exposing Snooping Tor HSDir Relays

    Guevara Noubir, Amirali Sanatinia
    Fri, 12:00 - 12:25
    Track One
  • Frontrunning the Frontrunners

    Paul Vixie
    Fri, 12:30 - 12:55
    Track One
  • Research on the Machines: Help the FTC Protect Privacy & Security

    Lorrie Cranor, Terrell McSweeny
    Fri, 13:00 - 13:50
    Track One
  • How to Design Distributed Systems Resilient Despite Malicious Participants

    Radia Perlman
    Fri, 14:00 - 14:50
    Track One
  • How to Remote Control an Airliner: SecurityFLawsin Avionics

    Sebastian Westerhold
    Fri, 15:00 - 15:50
    Track One
  • Robot Hacks Video Games: How TASBot Exploits Consoles with Custom Controllers

    Allan Cecil
    Fri, 16:00 - 16:50
    Track One
  • Hacking Next-Gen ATM's From Capture to Cashout

    Weston Hecker
    Fri, 17:00 - 17:50
    Track One
  • Saturday, August 6
  • How to Overthrow a Government

    Chris Rock
    Sat, 10:00 - 10:50
    Track One
  • Jittery MacGyver: Lessons Learned from Building a Bionic Hand out of a Coffee Maker

    Evan Booth
    Sat, 11:00 - 11:50
    Track One
  • Bypassing Captive Portals and Limited Networks

    Grant Bugher
    Sat, 12:00 - 12:25
    Track One
  • Retweet to Win: How 50 lines of Python made me the luckiest guy on Twitter

    Hunter Scott
    Sat, 12:30 - 12:55
    Track One
  • Six Degrees of Domain Admin - Using Graph Theory to Accelerate Red Team Operations

    Andy Robbins, Will Schroeder, Rohan Vazarkar
    Sat, 13:00 - 13:50
    Track One
  • Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter

    John Seymour, Philip Tully
    Sat, 14:00 - 14:50
    Track One
  • Forcing a Targeted LTE Cellphone into an Unsafe Network

    Haoqi Shan, Wanqiao Zhang
    Sat, 15:00 - 15:50
    Track One
  • 'Cyber' Who Done It?! Attribution Analysis Through Arrest History

    Jake Kouns
    Sat, 16:00 - 16:50
    Track One
  • Drunk Hacker History: Hacker Stories Powered by C2H6O for Fun & Profit

     
    Sat, 17:00 - 17:50
    Track One
  • Sunday, August 7
  • How to Do it Wrong: Smartphone Antivirus and Security Applications Under Fire

    Stephan Huber, Siegfried Rasthofer
    Sun, 10:00 - 10:50
    Track One
  • Hiding Wookiees in HTTP - HTTP smuggling is a thing we should know better and care about

    regilero
    Sun, 11:00 - 11:50
    Track One
  • Attacking BaseStations - an Odyssey through a Telco's Network

    Brian Butterly, Hendrik Schmidt
    Sun, 12:00 - 12:50
    Track One
  • Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicle

    Jianhao Liu, Wenyuan Xu, Chen Yan
    Sun, 13:00 - 13:50
    Track One
  • Help, I've got ANTs!!!

    Tamas Szakaly
    Sun, 14:00 - 14:50
    Track One
  • Stumping the Mobile Chipset

    Adam Donenfeld
    Sun, 15:00 - 15:50
    Track One
  • Closing Ceremonies

    Dark Tangent
    Sun, 16:30 - 17:50
    Track One