• Wednesday, July 26
  • Ichthyology: Phishing as a Science

    Karla Burnett
    Wed, 10:30 - 10:55
    Mandalay Bay GH
  • New Adventures in Spying 3G and 4G Users: Locate Track & Monitor

    Ravishankar Borgaonkar, Lucca Hirschi, Andrew Martin, Shinjo Park, Jean-Pierre Seifert, Altaf Shaik
    Wed, 11:15 - 12:05
    Mandalay Bay GH
  • The Active Directory Botnet

    Paul Kalinin, Ty Miller
    Wed, 13:30 - 14:20
    Mandalay Bay GH
  • Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game

    Kelly Shortridge
    Wed, 14:40 - 15:30
    Mandalay Bay GH
  • Cracking the Lens: Targeting HTTP's Hidden Attack-Surface

    James Kettle
    Wed, 16:00 - 16:50
    Mandalay Bay GH
  • Protecting Pentests: Recommendations for Performing More Secure Tests

    Wesley McGrew
    Wed, 17:05 - 17:30
    Mandalay Bay GH
  • Thursday, July 27
  • Bot vs. Bot for Evading Machine Learning Malware Detection

    Hyrum Anderson
    Thu, 09:00 - 09:25
    Mandalay Bay GH
  • 'Ghost Telephonist' Link Hijack Exploitations in 4G LTE CS Fallback

    Lin Huang, Jun Li, Haoqi Shan, Qing Yang, Yuwei Zheng
    Thu, 09:45 - 10:35
    Mandalay Bay GH
  • Why Most Cyber Security Training Fails and What We Can Do About it

    Arun Vishwanath
    Thu, 11:00 - 11:50
    Mandalay Bay GH
  • Cyber Wargaming: Lessons Learned in Influencing Security Stakeholders Inside and Outside Your Organization

    Jason Nichols
    Thu, 12:10 - 13:00
    Mandalay Bay GH
  • Automated Detection of Vulnerabilities in Black-Box Routers (and Other Network Devices)

    Gabi Nakibly
    Thu, 14:30 - 15:20
    Mandalay Bay GH
  • Lies and Damn Lies: Getting Past the Hype of Endpoint Security Solutions

    Lidia Giuliano, Mike Spaulding
    Thu, 15:50 - 16:40
    Mandalay Bay GH
  • A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!

    Orange Tsai
    Thu, 17:00 - 18:00
    Mandalay Bay GH