• Wednesday, August 8
  • Exposing the Bait: A Qualitative Look at the Impact of Autonomous Peer Communication to Enhance Organizational Phishing Detection

    Kingkane Malmquist
    Wed, 10:30 - 10:55
    Lagoon JKL
  • From Bot to Robot: How Abilities and Law Change with Physicality

    Wendy Knox Everette, Brittany Postnikoff, Sara Jayne Terp
    Wed, 11:15 - 12:05
    Lagoon JKL
  • Reversing a Japanese Wireless SD Card - From Zero to Code Execution

    Guillaume Valadon
    Wed, 13:30 - 14:20
    Lagoon JKL
  • Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology

    Lee Christensen, Matthew Graeber
    Wed, 14:40 - 15:30
    Lagoon JKL
  • Breaking Parser Logic: Take Your Path Normalization off and Pop 0days Out!

    Orange Tsai
    Wed, 16:00 - 16:50
    Lagoon JKL
  • Back to the Future: A Radical Insecure Design of KVM on ARM

    Rahul Kashyap, Baibhav Singh
    Wed, 17:05 - 17:30
    Lagoon JKL
  • Thursday, August 9
  • Real Eyes Realize Real Lies: Beating Deception Technologies

    Matan Hart
    Thu, 09:00 - 09:25
    Lagoon JKL
  • Snooping on Cellular Gateways and Their Critical Role in ICS

    Justin Shattuck
    Thu, 09:45 - 10:35
    Lagoon JKL
  • Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels

    Christian Dresen, Jens Müller
    Thu, 11:00 - 11:50
    Lagoon JKL
  • Wrangling with the Ghost: An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities

    Christopher Ertl, Anders Fogh, Matt Miller
    Thu, 12:10 - 13:00
    Lagoon JKL
  • Legal Liability for IOT Cybersecurity Vulnerabilities

    Ijay Palansky
    Thu, 14:30 - 15:20
    Lagoon JKL
  • Lowering the Bar: Deep Learning for Side Channel Analysis

    Baris Ege, Jasper Van Woudenberg
    Thu, 15:50 - 16:40
    Lagoon JKL
  • It's a PHP Unserialization Vulnerability Jim but Not as We Know It

    Sam Thomas
    Thu, 17:00 - 17:50
    Lagoon JKL