• Tuesday, October 18
  • CANtact: Open Source Automotive Tools

    Eric Evenchick
    Tue, 10:15 - 11:15
    801A - Tech
  • How to build a malware classifier [that doesn’t suck on real-world data]

    John Seymour
    Tue, 10:15 - 11:15
    801B - Tech
  • Securing Network Communications: An Investigation into Certificate Authorities on Mobile

    Andrew Blaich
    Tue, 10:15 - 11:15
    701A - Tech
  • WiFi Exploitation: How passive interception leads to active exploitation

    Solomon Sonya
    Tue, 13:25 - 14:25
    701A - Tech
  • Making sense of a million samples per day: Behavior-based Methods for Automated, Scalable Malware Analysis

    Stefano Zanero
    Tue, 13:25 - 14:25
    801B - Tech
  • The State of SCADA on the Internet

    Kyle Wilhoit
    Tue, 13:25 - 14:25
    801A - Tech
  • Practical Static Analysis for Continuous Application Security

    Justin Collins
    Tue, 14:40 - 15:40
    801B - Tech
  • Jihadism and Cryptography, from internet to softwares

    Julie Gommes
    Tue, 14:40 - 15:40
    801A - Tech
  • [Ab]using TLS for defensive wins

    Lee Brotherston
    Tue, 14:40 - 15:40
    701A - Tech
  • EventID Field Hunter (EFH) – Looking for malicious activities in your Windows events

    Rodrigo Montoro
    Tue, 15:55 - 16:55
    801A - Tech
  • Crash Course in Kubernetes & Security

    Matt Johansen
    Tue, 15:55 - 16:55
    701A - Tech
  • Hack Microsoft by using Microsoft signed binaries

    Pierre-Alexandre Braeken
    Tue, 15:55 - 16:55
    801B - Tech
  • Wednesday, October 19
  • Utilizing Memory and Network Forensics for Scalable Threat Detection and Response

    Andrew Case
    Wed, 10:15 - 11:15
    801B - Tech
  • Control system security, are we living on luck?

    Chris Sistrunk
    Wed, 10:15 - 11:15
    801A - Tech
  • How To Secure Serverless Applications

    Mark Nunnikhoven
    Wed, 10:15 - 11:15
    701A - Tech
  • AirBnBeware: short-term rentals, long-term pwnage

    Jeremy Galloway
    Wed, 13:25 - 14:25
    701A - Tech
  • RTF Abuse: Exploitation, Evasion and Counter Measures

    Devon Greene
    Wed, 13:25 - 14:25
    801A - Tech
  • Purple Teaming the Cyber Kill Chain: Practical Exercises for Management

    Chris Gates, Haydn Johnson
    Wed, 13:25 - 14:25
    801B - Tech
  • Open Source Malware Lab

    Robert Simmons
    Wed, 14:40 - 15:40
    801B - Tech
  • Hiding in Plain Sight – Taking Control of Windows Patches

    Travis Smith
    Wed, 14:40 - 15:40
    801A - Tech
  • Lessons Learned Hunting IoT Malware

    Oliver Bilodeau
    Wed, 14:40 - 15:40
    701A - Tech