• Wednesday, July 26
  • Breaking Electronic Door Locks Like You're on CSI: Cyber

    Colin O'Flynn
    Wed, 10:30 - 10:55
    Mandalay Bay EF
  • Splunking Dark Tools - A Pentesters Guide to Pwnage Visualization

    Nathan Bates, Bryce Kunz
    Wed, 11:15 - 12:05
    Mandalay Bay EF
  • Hacking Hardware with a \$10 SD Card Reader

    Amir Etemadieh, CJ Heres, Khoa Hoang
    Wed, 13:30 - 14:20
    Mandalay Bay EF
  • The Art of Securing 100 Products

    Nir Valtman
    Wed, 14:40 - 15:30
    Mandalay Bay EF
  • White Hat Privilege: The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data

    Karen Neuman, Jacob Osborn
    Wed, 16:00 - 16:50
    Mandalay Bay EF
  • Tracking Ransomware End to End

    Elie Bursztein, Luca Invernizzi, Kylie McRoberts
    Wed, 17:05 - 17:30
    Mandalay Bay EF
  • Thursday, July 27
  • The Shadow Brokers – Cyber Fear Game-Changers

    Matthieu Suiche
    Thu, 09:00 - 09:25
    Mandalay Bay EF
  • Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets

    Nitay Artenstein
    Thu, 09:45 - 10:35
    Mandalay Bay EF
  • Infecting the Enterprise: Abusing Office365+Powershell for Covert C2

    Craig Dods
    Thu, 11:00 - 11:50
    Mandalay Bay EF
  • AVPASS: Leaking and Bypassing Antivirus Detection Model Automatically

    Chanil Jeon, Jinho Jung, Taesoo Kim, Max Wolotsky, Insu Yun
    Thu, 12:10 - 13:00
    Mandalay Bay EF
  • Friday the 13th: JSON Attacks

    Oleksandr Mirosh, Alvaro Muñoz
    Thu, 14:30 - 15:20
    Mandalay Bay EF
  • Exploiting Network Printers

    Jens Müller
    Thu, 15:50 - 16:40
    Mandalay Bay EF
  • Breaking the x86 Instruction Set

    Christopher Domas
    Thu, 17:00 - 18:00
    Mandalay Bay EF