• A
  • Advanced Pre-Breach Planning: Utilizing a Purple Team to Measure Effectiveness vs. Maturity

    Justin Harvey
    Thu, 09:45 - 10:35
    Lagoon ABCGHI
  • Adventures in Attacking Wind Farm Control Networks

    Jason Staggs
    Wed, 10:30 - 10:55
    Lagoon ABCGHI
  • All Your SMS & Contacts Belong to ADUPS & Others

    Azzedine Benameur, Ryan Johnson, Angelos Stavrou
    Wed, 10:30 - 10:55
    South Seas ABE
  • An ACE Up the Sleeve: Designing Active Directory DACL Backdoors

    Andy Robbins, Will Schroeder
    Wed, 14:40 - 15:30
    South Seas ABE
  • And Then the Script-Kiddie Said Let There be No Light. Are Cyber-Attacks on the Power Grid Limited to Nation-State Actors?

    Anastasis Keliris, Charalambos Konstantinou, Mihalis Maniatakos
    Thu, 15:50 - 16:40
    South Seas ABE
  • A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!

    Orange Tsai
    Thu, 17:00 - 18:00
    Mandalay Bay GH
  • Attacking Encrypted USB Keys the Hard(ware) Way

    Rémi Audebert, Elie Bursztein, Jean-Michel Picod
    Thu, 12:10 - 13:00
    South Seas CDF
  • Automated Detection of Vulnerabilities in Black-Box Routers (and Other Network Devices)

    Gabi Nakibly
    Thu, 14:30 - 15:20
    Mandalay Bay GH
  • Automated Testing of Crypto Software Using Differential Fuzzing

    Jean-Philippe Aumasson, Yolan Romailler
    Wed, 14:40 - 15:30
    Lagoon ABCGHI
  • AVPASS: Leaking and Bypassing Antivirus Detection Model Automatically

    Chanil Jeon, Jinho Jung, Taesoo Kim, Max Wolotsky, Insu Yun
    Thu, 12:10 - 13:00
    Mandalay Bay EF
  • B
  • Betraying the BIOS: Where the Guardians of the BIOS are Failing

    Alexander Matrosov
    Thu, 17:00 - 18:00
    South Seas ABE
  • Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game

    Kelly Shortridge
    Wed, 14:40 - 15:30
    Mandalay Bay GH
  • Blue Pill for Your Phone

    Oleksandr Bazhaniuk, Yuriy Bulygin
    Thu, 15:50 - 16:40
    Mandalay Bay CD
  • Bochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking

    Mateusz Jurczyk
    Wed, 14:40 - 15:30
    Jasmine Ballroom
  • Bot vs. Bot for Evading Machine Learning Malware Detection

    Hyrum Anderson
    Thu, 09:00 - 09:25
    Mandalay Bay GH
  • Breaking Electronic Door Locks Like You're on CSI: Cyber

    Colin O'Flynn
    Wed, 10:30 - 10:55
    Mandalay Bay EF
  • Breaking the Laws of Robotics: Attacking Industrial Robots

    Federico Maggi, Marcello Pogliani, Mario Polino, Davide Quarta, Andrea Maria Zanchettin, Stefano Zanero
    Thu, 11:00 - 11:50
    Mandalay Bay AB
  • Breaking the x86 Instruction Set

    Christopher Domas
    Thu, 17:00 - 18:00
    Mandalay Bay EF
  • Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets

    Nitay Artenstein
    Thu, 09:45 - 10:35
    Mandalay Bay EF
  • Bug Collisions Meet Government Vulnerability Disclosure

    Lillian Ablon, Jason Healey, Trey Herr, Katie Moussouris, Kim Zetter
    Thu, 11:00 - 11:50
    Jasmine Ballroom
  • C
  • Challenges of Cooperation Across Cyberspace

    Khoo Boon Hui, Marina Kaljurand, Wolfgang Kleinwachter, Jeff Moss, Joseph Nye, Bill Woodcock
    Wed, 13:30 - 14:20
    Mandalay Bay AB
  • Cloak & Dagger: From Two Permissions to Complete Control of the UI Feedback Loop

    Simon Pak Ho Chung, Yanick Fratantonio, Wenke Lee, Chenxiong Qian
    Thu, 17:00 - 18:00
    Lagoon DEFJKL
  • Cracking the Lens: Targeting HTTP's Hidden Attack-Surface

    James Kettle
    Wed, 16:00 - 16:50
    Mandalay Bay GH
  • Cyber Wargaming: Lessons Learned in Influencing Security Stakeholders Inside and Outside Your Organization

    Jason Nichols
    Thu, 12:10 - 13:00
    Mandalay Bay GH
  • D
  • Datacenter Orchestration Security and Insecurity: Assessing Kubernetes Mesos and Docker at Scale

    Dino Dai Zovi
    Thu, 09:45 - 10:35
    South Seas CDF
  • Dealing the Perfect Hand - Shuffling Memory Blocks on z/OS

    Ayoub EL AASSAL
    Thu, 17:00 - 18:00
    Mandalay Bay AB
  • Defeating Samsung KNOX with Zero Privilege

    Di Shen
    Thu, 14:30 - 15:20
    South Seas CDF
  • Delivering Javascript to World+Dog

    Kyle Randolph
    Wed, 13:30 - 14:20
    Mandalay Bay CD
  • Developing Trust and Gitting Betrayed

    Noah Beddome, Clint Gibler
    Wed, 16:00 - 16:50
    Lagoon DEFJKL
  • Digital Vengeance: Exploiting the Most Notorious C&C Toolkits

    Waylon Grange
    Thu, 15:50 - 16:40
    South Seas CDF
  • Don't Trust the DOM: Bypassing XSS Mitigations via Script Gadgets

    Krzysztof Kotowicz, Sebastian Lekies, Eduardo Vela
    Thu, 11:00 - 11:50
    South Seas CDF
  • E
  • Electronegativity - A Study of Electron Security

    Luca Carettoni
    Thu, 15:50 - 16:40
    Jasmine Ballroom
  • Escalating Insider Threats Using VMware's API

    Ofri Ziv
    Thu, 09:00 - 09:25
    South Seas ABE
  • Evading Microsoft ATA for Active Directory Domination

    Nikhil Mittal
    Thu, 09:45 - 10:35
    South Seas ABE
  • Evil Bubbles or How to Deliver Attack Payload via the Physics of the Process

    Marina Krotofil
    Thu, 14:30 - 15:20
    Mandalay Bay CD
  • Evilsploit – A Universal Hardware Hacking Toolkit

    Chui Yew Leong, Mingming Wan
    Wed, 16:00 - 16:50
    South Seas CDF
  • Evolutionary Kernel Fuzzing

    Richard Johnson
    Thu, 14:30 - 15:20
    Lagoon ABCGHI
  • Exploitation of Kernel Pool Overflow on Microsoft Windows 10 DKOM/DKOHM is Back in DKOOHM! Direct Kernel Optional Object Header Manipulation

    Nikita Tarakanov
    Thu, 12:10 - 13:00
    Jasmine Ballroom
  • Exploiting Network Printers

    Jens Müller
    Thu, 15:50 - 16:40
    Mandalay Bay EF
  • Exploit Kit Cornucopia

    Brad Antoniewicz, Matt Foley
    Thu, 14:30 - 15:20
    South Seas ABE
  • F
  • Fad or Future? Getting Past the Bug Bounty Hype

    Angelo Prado, Kymberlee Price, Charles Valentine
    Thu, 09:45 - 10:35
    Lagoon DEFJKL
  • Fighting Targeted Malware in the Mobile Ecosystem

    Andrew Blaich, Megan Ruthven
    Wed, 17:05 - 17:30
    Mandalay Bay AB
  • Fighting the Previous War (aka: Attacking and Defending in the Era of the Cloud)

    Haroon Meer, Marco Slaviero
    Wed, 16:00 - 16:50
    Lagoon ABCGHI
  • Firmware is the New Black - Analyzing Past Three Years of BIOS/UEFI Security Vulnerabilities

    Rodrigo Rubira Branco, Bruce Monroe, Vincent Zimmer
    Thu, 14:30 - 15:20
    Lagoon DEFJKL
  • FlowFuzz - A Framework for Fuzzing OpenFlow-Enabled Software and Hardware Switches

    Nicholas Gray, Manuel Sommer, Phuoc Tran-Gia, Thomas Zinner
    Wed, 11:15 - 12:05
    Jasmine Ballroom
  • Fractured Backbone: Breaking Modern OS Defenses with Firmware Attacks

    Oleksandr Bazhaniuk, Yuriy Bulygin, Andrew Furtak, Mikhail Gorobets
    Wed, 14:40 - 15:30
    Lagoon DEFJKL
  • Free-Fall: Hacking Tesla from Wireless to CAN Bus

    Yuefeng Du, Ling Liu, Sen Nie
    Thu, 12:10 - 13:00
    South Seas ABE
  • Friday the 13th: JSON Attacks

    Oleksandr Mirosh, Alvaro Muñoz
    Thu, 14:30 - 15:20
    Mandalay Bay EF
  • G
  • Game of Chromes: Owning the Web with Zombie Chrome Extensions

    Tomer Cohen
    Thu, 12:10 - 13:00
    Lagoon ABCGHI
  • Garbage In Garbage Out: How Purportedly Great Machine Learning Models can be Screwed Up by Bad Data

    Hillary Sanders
    Wed, 17:05 - 17:30
    South Seas CDF
  • '
  • 'Ghost Telephonist' Link Hijack Exploitations in 4G LTE CS Fallback

    Lin Huang, Jun Li, Haoqi Shan, Qing Yang, Yuwei Zheng
    Thu, 09:45 - 10:35
    Mandalay Bay GH
  • G
  • Go Nuclear: Breaking Radiation Monitoring Devices

    Ruben Santamarta
    Wed, 16:00 - 16:50
    Jasmine Ballroom
  • Go to Hunt Then Sleep

    Daniele Bianco, Robert M. Lee
    Thu, 11:00 - 11:50
    South Seas ABE
  • H
  • Hacking Hardware with a \$10 SD Card Reader

    Amir Etemadieh, CJ Heres, Khoa Hoang
    Wed, 13:30 - 14:20
    Mandalay Bay EF
  • Hacking Serverless Runtimes: Profiling AWS Lambda Azure Functions and More

    Graham Jones, Andrew Krug
    Wed, 13:30 - 14:20
    Jasmine Ballroom
  • Honey I Shrunk the Attack Surface – Adventures in Android Security Hardening

    Nick Kralevich
    Thu, 12:10 - 13:00
    Lagoon DEFJKL
  • How We Created the First SHA-1 Collision and What it Means for Hash Security

    Elie Bursztein
    Wed, 13:30 - 14:20
    South Seas CDF
  • Hunting GPS Jammers

    Vlad Gostomelsky
    Thu, 11:00 - 11:50
    Lagoon ABCGHI
  • I
  • Ichthyology: Phishing as a Science

    Karla Burnett
    Wed, 10:30 - 10:55
    Mandalay Bay GH
  • Industroyer/Crashoverride: Zero Things Cool About a Threat Group Targeting the Power Grid

    Anton Cherepanov, Robert M. Lee, Robert Lipovsky, Ben Miller, Joe Slowik
    Wed, 11:15 - 12:05
    Lagoon ABCGHI
  • Infecting the Enterprise: Abusing Office365+Powershell for Covert C2

    Craig Dods
    Thu, 11:00 - 11:50
    Mandalay Bay EF
  • Influencing the Market to Improve Security

    Justine Bone, Chris Wysopal
    Thu, 09:00 - 09:25
    Mandalay Bay AB
  • (
  • (in)Security in Building Automation: How to Create Dark Buildings with Light Speed

    Thomas Brandstetter
    Wed, 17:05 - 17:30
    Mandalay Bay CD
  • I
  • Intel AMT Stealth Breakthrough

    Alexander Ermolov, Dmitriy Evdokimov, Maksim Malyutin
    Thu, 15:50 - 16:40
    Mandalay Bay AB
  • Intel SGX Remote Attestation is Not Sufficient

    Yogesh Swami
    Thu, 11:00 - 11:50
    Mandalay Bay CD
  • Intercepting iCloud Keychain

    Alexandru Radocea
    Wed, 17:05 - 17:30
    Lagoon ABCGHI
  • IoTCandyJar: Towards an Intelligent-Interaction Honeypot for IoT Devices

    Xing Jin, Tongbo Luo, Xin Ouyang, Zhaoyan Xu
    Thu, 17:00 - 18:00
    Lagoon ABCGHI
  • K
  • kR\^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse

    Marios Pomonis
    Thu, 12:10 - 13:00
    Mandalay Bay CD
  • L
  • Lies and Damn Lies: Getting Past the Hype of Endpoint Security Solutions

    Lidia Giuliano, Mike Spaulding
    Thu, 15:50 - 16:40
    Mandalay Bay GH
  • M
  • Many Birds One Stone: Exploiting a Single SQLite Vulnerability Across Multiple Software

    Siji Feng, Kun Yang, Zhi Zhou
    Wed, 11:15 - 12:05
    Mandalay Bay AB
  • N
  • Network Automation is Not Your Safe Haven: Protocol Analysis and Vulnerabilities of Autonomic Network

    Omar Eissa
    Wed, 13:30 - 14:20
    South Seas ABE
  • New Adventures in Spying 3G and 4G Users: Locate Track & Monitor

    Ravishankar Borgaonkar, Lucca Hirschi, Andrew Martin, Shinjo Park, Jean-Pierre Seifert, Altaf Shaik
    Wed, 11:15 - 12:05
    Mandalay Bay GH
  • O
  • Ochko123 - How the Feds Caught Russian Mega-Carder Roman Seleznev

    Norman Barbosa, Harold Chun
    Wed, 16:00 - 16:50
    Mandalay Bay AB
  • Offensive Malware Analysis: Dissecting OSX/FruitFly via a Custom C&C Server

    Patrick Wardle
    Wed, 17:05 - 17:30
    Lagoon DEFJKL
  • OpenCrypto: Unchaining the JavaCard Ecosystem

    Dan Cvrcek, George Danezis, Vasilios Mavroudis, Petr Svenda
    Thu, 09:00 - 09:25
    Mandalay Bay CD
  • Orange is the New Purple - How and Why to Integrate Development Teams with Red/Blue Teams to Build More Secure Software

    April C. Wright
    Wed, 10:30 - 10:55
    Mandalay Bay AB
  • P
  • PEIMA: Harnessing Power Laws to Detect Malicious Activities from Denial of Service to Intrusion Detection Traffic Analysis and Beyond

    Stefan Prandl
    Wed, 10:30 - 10:55
    Mandalay Bay CD
  • Practical Tips for Defending Web Applications in the Age of DevOps

    Zane Lackey
    Thu, 11:00 - 11:50
    Lagoon DEFJKL
  • Protecting Pentests: Recommendations for Performing More Secure Tests

    Wesley McGrew
    Wed, 17:05 - 17:30
    Mandalay Bay GH
  • Protecting Visual Assets: Digital Image Counter-Forensics

    Kenneth Brown, Nikita Mazurov
    Wed, 17:05 - 17:30
    Jasmine Ballroom
  • Pwnie Awards

    Dino Dai Zovi
    Wed, 18:30 - 19:30
    Lagoon ABCGHI
  • Q
  • Quantifying Risk in Consumer Software at Scale - Consumer Reports' Digital Standard

    Eason Goodale, Sarah Zatko
    Thu, 12:10 - 13:00
    Mandalay Bay AB
  • R
  • RBN Reloaded - Amplifying Signals from the Underground

    Dhia Mahjoub, Jason Passwaters, David Rodriguez
    Thu, 17:00 - 17:25
    Mandalay Bay CD
  • Real Humans Simulated Attacks: Usability Testing with Attack Scenarios

    Lorrie Cranor
    Wed, 11:15 - 12:05
    Lagoon DEFJKL
  • Redesigning PKI to Solve Revocation Expiration and Rotation Problems

    Brian Knopf
    Thu, 09:45 - 10:35
    Mandalay Bay AB
  • Revoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using Science

    Daniel Bohannon, Lee Holmes
    Thu, 17:00 - 18:00
    Jasmine Ballroom
  • rVMI: A New Paradigm for Full System Analysis

    Jonas Pfoh, Sebastian Vogl
    Thu, 09:45 - 10:35
    Mandalay Bay CD
  • S
  • ShieldFS: The Last Word in Ransomware Resilient File Systems

    Alessandro Barenghi, Andrea Continella, Alessandro Guagnelli, Federico Maggi, Giulio De Pasquale, Stefano Zanero, Giovanni Zingaro
    Wed, 14:40 - 15:30
    Mandalay Bay AB
  • Skype & Type: Keystroke Leakage over VoIP

    Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik
    Thu, 09:00 - 09:25
    Lagoon ABCGHI
  • Sonic Gun to Smart Devices: Your Devices Lose Control Under Ultrasound/Sound

    Wang Kang, Shangyuan LI, Aimin Pan, Zhengbo Wang, Bo Yang
    Thu, 09:45 - 10:35
    Jasmine Ballroom
  • So You Want to Market Your Security Product...

    Aaron Alva, Terrell McSweeny
    Wed, 14:40 - 15:30
    Mandalay Bay CD
  • Splunking Dark Tools - A Pentesters Guide to Pwnage Visualization

    Nathan Bates, Bryce Kunz
    Wed, 11:15 - 12:05
    Mandalay Bay EF
  • SS7 Attacker Heaven Turns into Riot: How to Make Nation-State and Intelligence Attackers' Lives Much Harder on Mobile Networks

    Martin Kacer, Philippe Langlois
    Wed, 13:30 - 14:20
    Lagoon DEFJKL
  • Stepping Up Our Game: Re-focusing the Security Community on Defense and Making Security Work for Everyone

    Alex Stamos
    Wed, 09:00 - 10:00
    Mandalay Bay Events Center
  • T
  • Taking DMA Attacks to the Next Level: How to do Arbitrary Memory Reads/Writes in a Live and Unmodified System Using a Rogue Memory Controller

    Dan Lake, Anna Trikalinou
    Wed, 11:15 - 12:05
    Mandalay Bay CD
  • Taking Over the World Through MQTT - Aftermath

    Lucas Lundgren
    Thu, 14:30 - 15:20
    Jasmine Ballroom
  • Taking Windows 10 Kernel Exploitation to the Next Level – Leveraging Write-What-Where Vulnerabilities in Creators Update

    Morten Schenk
    Wed, 13:30 - 14:20
    Lagoon ABCGHI
  • The Active Directory Botnet

    Paul Kalinin, Ty Miller
    Wed, 13:30 - 14:20
    Mandalay Bay GH
  • The Adventures of AV and the Leaky Sandbox

    Amit Klein, Itzik Kotler
    Thu, 17:00 - 18:00
    South Seas CDF
  • The Art of Securing 100 Products

    Nir Valtman
    Wed, 14:40 - 15:30
    Mandalay Bay EF
  • The Avalanche Takedown: Landslide for Law Enforcement

    Tom Grasso
    Wed, 11:15 - 12:05
    South Seas CDF
  • The Epocholypse 2038: What's in Store for the Next 20 Years

    Mikko Hypponen
    Thu, 09:00 - 09:25
    South Seas CDF
  • The Future of ApplePwn - How to Save Your Money

    Timur Yunusov
    Thu, 09:00 - 09:25
    Jasmine Ballroom
  • The Industrial Revolution of Lateral Movement

    Tal Be'ery, Tal Maor
    Thu, 09:00 - 09:25
    Lagoon DEFJKL
  • The Origin of Array \[@@species\]: How Standards Drive Bugs in Script Engines

    Natalie Silvanovich
    Thu, 14:30 - 15:20
    Mandalay Bay AB
  • The Shadow Brokers – Cyber Fear Game-Changers

    Matthieu Suiche
    Thu, 09:00 - 09:25
    Mandalay Bay EF
  • They're Coming for Your Tools: Exploiting Design Flaws for Active Intrusion Prevention

    John Ventura
    Wed, 10:30 - 10:55
    South Seas CDF
  • Tracking Ransomware End to End

    Elie Bursztein, Luca Invernizzi, Kylie McRoberts
    Wed, 17:05 - 17:30
    Mandalay Bay EF
  • W
  • Web Cache Deception Attack

    Omer Gil
    Wed, 10:30 - 10:55
    Jasmine Ballroom
  • Well that Escalated Quickly! How Abusing Docker API Led to Remote Code Execution Same Origin Bypass and Persistence in the Hypervisor via Shadow Containers

    Michael Cherny, Sagie Dulce
    Thu, 15:50 - 16:40
    Lagoon DEFJKL
  • What's on the Wireless? Automating RF Signal Identification

    Michael Ossmann, Dominic Spill
    Wed, 14:40 - 15:30
    South Seas CDF
  • What They're Teaching Kids These Days: Comparing Security Curricula and Accreditations to Industry Needs

    Rob Olson, Chaim Sanders
    Wed, 16:00 - 16:50
    South Seas ABE
  • When IoT Attacks: Understanding the Safety Risks Associated with Connected Devices

    Jonathan Butts, Billy Rios
    Wed, 11:15 - 12:05
    South Seas ABE
  • White Hat Privilege: The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data

    Karen Neuman, Jacob Osborn
    Wed, 16:00 - 16:50
    Mandalay Bay EF
  • Why Most Cyber Security Training Fails and What We Can Do About it

    Arun Vishwanath
    Thu, 11:00 - 11:50
    Mandalay Bay GH
  • WiFuzz: Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake

    Mathy Vanhoef
    Thu, 15:50 - 16:40
    Lagoon ABCGHI
  • Wire Me Through Machine Learning

    Ankit Singh, Vijay Thaware
    Wed, 10:30 - 10:55
    Lagoon DEFJKL
  • WSUSpendu: How to Hang WSUS Clients

    Romain Coltel, Yves Le Provost
    Wed, 16:00 - 16:50
    Mandalay Bay CD
  • Z
  • Zero Days Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits

    Lillian Ablon
    Wed, 17:05 - 17:30
    South Seas ABE