• Wednesday, July 26
  • They're Coming for Your Tools: Exploiting Design Flaws for Active Intrusion Prevention

    John Ventura
    Wed, 10:30 - 10:55
    South Seas CDF
  • The Avalanche Takedown: Landslide for Law Enforcement

    Tom Grasso
    Wed, 11:15 - 12:05
    South Seas CDF
  • How We Created the First SHA-1 Collision and What it Means for Hash Security

    Elie Bursztein
    Wed, 13:30 - 14:20
    South Seas CDF
  • What's on the Wireless? Automating RF Signal Identification

    Michael Ossmann, Dominic Spill
    Wed, 14:40 - 15:30
    South Seas CDF
  • Evilsploit – A Universal Hardware Hacking Toolkit

    Chui Yew Leong, Mingming Wan
    Wed, 16:00 - 16:50
    South Seas CDF
  • Garbage In Garbage Out: How Purportedly Great Machine Learning Models can be Screwed Up by Bad Data

    Hillary Sanders
    Wed, 17:05 - 17:30
    South Seas CDF
  • Thursday, July 27
  • The Epocholypse 2038: What's in Store for the Next 20 Years

    Mikko Hypponen
    Thu, 09:00 - 09:25
    South Seas CDF
  • Datacenter Orchestration Security and Insecurity: Assessing Kubernetes Mesos and Docker at Scale

    Dino Dai Zovi
    Thu, 09:45 - 10:35
    South Seas CDF
  • Don't Trust the DOM: Bypassing XSS Mitigations via Script Gadgets

    Krzysztof Kotowicz, Sebastian Lekies, Eduardo Vela
    Thu, 11:00 - 11:50
    South Seas CDF
  • Attacking Encrypted USB Keys the Hard(ware) Way

    Rémi Audebert, Elie Bursztein, Jean-Michel Picod
    Thu, 12:10 - 13:00
    South Seas CDF
  • Defeating Samsung KNOX with Zero Privilege

    Di Shen
    Thu, 14:30 - 15:20
    South Seas CDF
  • Digital Vengeance: Exploiting the Most Notorious C&C Toolkits

    Waylon Grange
    Thu, 15:50 - 16:40
    South Seas CDF
  • The Adventures of AV and the Leaky Sandbox

    Amit Klein, Itzik Kotler
    Thu, 17:00 - 18:00
    South Seas CDF