• Saturday, January 20
  • The Background Noise of the Internet

    Andrew Morris
    Sat, 10:00 - 10:50
    Far Room - Belay It
  • Profiling and Detecting all Things SSL with JA3

    John B. Althouse, Jeff Atkinson
    Sat, 11:00 - 11:50
    Far Room - Belay It
  • Nation-State Espionage: Hunting Multi-Platform APTs on a Global Scale

    Michael Flossman, Eva Galperin, Cooper Quintin
    Sat, 12:00 - 12:50
    Far Room - Belay It
  • Catch Me If You Can: A Decade of Evasive Malware Attack and Defense

    Alex Bulazel, Bülent Yener
    Sat, 14:00 - 14:50
    Far Room - Belay It
  • Someone is Lying to You on the Internet: Using Analytics to Find Bot Submissions in the FCC Net Neutrality Submissions

    Leah Figueroa
    Sat, 15:00 - 15:20
    Far Room - Belay It
  • Bludgeoning Bootloader Bugs: No Write Left Behind

    Rebecca Shapiro
    Sat, 15:30 - 15:50
    Far Room - Belay It
  • AWS Honey Tokens with SPACECRAB

    Dan Bourke
    Sat, 16:00 - 16:20
    Far Room - Belay It
  • Time Signature Based Matching for Data Fusion and Coordination Detection in Cyber Relevant Logs

    Lauren Deason
    Sat, 16:30 - 16:50
    Far Room - Belay It
  • Defending Against Robot Attacks

    Brittany Postnikoff
    Sat, 17:00 - 17:50
    Far Room - Belay It
  • Sunday, January 21
  • Deep Learning for Realtime Malware Detection

    Kate Highnam, Domenic Puzio
    Sun, 10:00 - 10:50
    Far Room - Belay It
  • Securing Bare Metal Hardware at Scale

    Matt King, Paul McMillan
    Sun, 11:00 - 11:50
    Far Room - Belay It
  • Getting Cozy with OpenBSM Auditing on MacOS … The Good, the Bad, & the Ugly

    Patrick Wardle
    Sun, 12:00 - 12:50
    Far Room - Belay It