• Wednesday, July 26
  • PEIMA: Harnessing Power Laws to Detect Malicious Activities from Denial of Service to Intrusion Detection Traffic Analysis and Beyond

    Stefan Prandl
    Wed, 10:30 - 10:55
    Mandalay Bay CD
  • Taking DMA Attacks to the Next Level: How to do Arbitrary Memory Reads/Writes in a Live and Unmodified System Using a Rogue Memory Controller

    Dan Lake, Anna Trikalinou
    Wed, 11:15 - 12:05
    Mandalay Bay CD
  • Delivering Javascript to World+Dog

    Kyle Randolph
    Wed, 13:30 - 14:20
    Mandalay Bay CD
  • So You Want to Market Your Security Product...

    Aaron Alva, Terrell McSweeny
    Wed, 14:40 - 15:30
    Mandalay Bay CD
  • WSUSpendu: How to Hang WSUS Clients

    Romain Coltel, Yves Le Provost
    Wed, 16:00 - 16:50
    Mandalay Bay CD
  • (in)Security in Building Automation: How to Create Dark Buildings with Light Speed

    Thomas Brandstetter
    Wed, 17:05 - 17:30
    Mandalay Bay CD
  • Thursday, July 27
  • OpenCrypto: Unchaining the JavaCard Ecosystem

    Dan Cvrcek, George Danezis, Vasilios Mavroudis, Petr Svenda
    Thu, 09:00 - 09:25
    Mandalay Bay CD
  • rVMI: A New Paradigm for Full System Analysis

    Jonas Pfoh, Sebastian Vogl
    Thu, 09:45 - 10:35
    Mandalay Bay CD
  • Intel SGX Remote Attestation is Not Sufficient

    Yogesh Swami
    Thu, 11:00 - 11:50
    Mandalay Bay CD
  • kR\^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse

    Marios Pomonis
    Thu, 12:10 - 13:00
    Mandalay Bay CD
  • Evil Bubbles or How to Deliver Attack Payload via the Physics of the Process

    Marina Krotofil
    Thu, 14:30 - 15:20
    Mandalay Bay CD
  • Blue Pill for Your Phone

    Oleksandr Bazhaniuk, Yuriy Bulygin
    Thu, 15:50 - 16:40
    Mandalay Bay CD
  • RBN Reloaded - Amplifying Signals from the Underground

    Dhia Mahjoub, Jason Passwaters, David Rodriguez
    Thu, 17:00 - 17:25
    Mandalay Bay CD