• A
  • A Brief History of Mitigation: The Path to EL1 in iOS 11

    Ian Beer
    Wed, 16:00 - 16:50
    Lagoon GHI
  • A Deep Dive into macOS MDM (and How it can be Compromised)

    Max Bélanger, Jesse Endahl
    Thu, 11:00 - 11:50
    Lagoon GHI
  • A Dive in to Hyper-V Architecture & Vulnerabilities

    Joe Bialek, Nicolas Joly
    Wed, 11:15 - 12:05
    South Pacific F
  • AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries

    Kang Li
    Wed, 17:05 - 17:30
    Jasmine Ballroom
  • AI & ML in Cyber Security - Why Algorithms are Dangerous

    Raffael Marty
    Thu, 11:00 - 11:50
    South Seas ABE
  • An Attacker Looks at Docker: Approaching Multi-Container Applications

    Wesley Mcgrew
    Thu, 17:00 - 17:50
    South Pacific F
  • Another Flip in the Row

    Daniel Gruss, Moritz Lipp, Michael Schwarz
    Thu, 14:30 - 15:20
    Lagoon GHI
  • Applied Self-Driving Car Security

    Charlie Miller, Christopher Valasek
    Thu, 12:10 - 13:00
    South Seas ABE
  • Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies

    Alejandro Hernandez
    Thu, 11:00 - 11:50
    South Seas CDF
  • ARTist - A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware

    Oliver Schranz
    Thu, 09:00 - 09:25
    Lagoon GHI
  • A Tangled Curl: Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme

    Ethan Heilman, Neha Narula
    Wed, 17:05 - 17:30
    Islander FG
  • Automated Discovery of Deserialization Gadget Chains

    Ian Haken
    Thu, 14:30 - 15:20
    Jasmine Ballroom
  • B
  • Back to the Future: A Radical Insecure Design of KVM on ARM

    Rahul Kashyap, Baibhav Singh
    Wed, 17:05 - 17:30
    Lagoon JKL
  • Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure

    Kevin Perlow
    Wed, 17:05 - 17:30
    South Seas CDF
  • Behind the Speculative Curtain: The True Story of Fighting Meltdown and Spectre

    Eric Doerr, Matt Linton, Art Manion, Chris Robinson
    Wed, 16:00 - 16:50
    South Pacific F
  • Black Box is Dead. Long Live Black Box!

    Vladimir Kononovich, Aleksei Stennikov
    Thu, 09:45 - 10:35
    Islander EI
  • Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths

    Jay Little
    Wed, 11:15 - 12:05
    South Seas CDF
  • Breaking Parser Logic: Take Your Path Normalization off and Pop 0days Out!

    Orange Tsai
    Wed, 16:00 - 16:50
    Lagoon JKL
  • Breaking the IIoT: Hacking industrial Control Gateways

    Thomas Roth
    Wed, 16:00 - 16:50
    South Seas ABE
  • C
  • Catch me Yes we can! – Pwning Social Engineers using Natural Language Processing Techniques in Real-Time

    Marcel Carlsson, Ian Harris
    Thu, 14:30 - 15:20
    South Pacific F
  • Compression Oracle Attacks on VPN Networks

    Ahamed Nafeez
    Wed, 13:30 - 14:20
    Lagoon GHI
  • D
  • Decompiler Internals: Microcode

    Ilfak Guilfanov
    Thu, 11:00 - 11:50
    Islander FG
  • Deep Dive into an ICS Firewall Looking for the Fire Hole

    Benoit Camredon, Julien Lenoir
    Wed, 13:30 - 14:20
    South Seas CDF
  • DeepLocker - Concealing Targeted Attacks with AI Locksmithing

    Jiyong Jang, Dhilung Kirat, Marc Ph Stoecklin
    Thu, 17:00 - 17:50
    South Seas ABE
  • Deep Neural Networks for Hackers: Methods Applications and Open Source Tools

    Joshua Saxe
    Wed, 11:15 - 12:05
    South Seas ABE
  • Demystifying PTSD in the Cybersecurity Environment

    Joe Slowik
    Thu, 09:00 - 09:25
    South Seas ABE
  • Detecting Credential Compromise in AWS

    William Bengtson
    Wed, 10:30 - 10:55
    South Pacific F
  • Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform Capabilities

    Brad Geesaman
    Thu, 11:00 - 11:50
    Islander EI
  • Dissecting Non-Malicious Artifacts: One IP at a Time

    Dani Goland, Ido Naor
    Wed, 10:30 - 10:55
    Islander FG
  • Don't @ Me: Hunting Twitter Bots at Scale

    Olabode Anise, Jordan Wright
    Wed, 14:40 - 15:30
    Jasmine Ballroom
  • E
  • Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking

    Louis Dion Marcil
    Wed, 10:30 - 10:55
    Jasmine Ballroom
  • Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels

    Christian Dresen, Jens Müller
    Thu, 11:00 - 11:50
    Lagoon JKL
  • Every ROSE has its Thorn: The Dark Art of Remote Online Social Engineering

    Matt Wixey
    Wed, 14:40 - 15:30
    South Seas CDF
  • Exploitation of a Modern Smartphone Baseband

    Marco Grassi, Muqing Liu, Tianyi Xie
    Thu, 14:30 - 15:20
    South Seas ABE
  • Exposing the Bait: A Qualitative Look at the Impact of Autonomous Peer Communication to Enhance Organizational Phishing Detection

    Kingkane Malmquist
    Wed, 10:30 - 10:55
    Lagoon JKL
  • F
  • Finding Xori: Malware Analysis Triage with Automated Disassembly

    Amanda Rousseau, Rich Seymour
    Wed, 10:30 - 10:55
    South Seas CDF
  • Fire & Ice: Making and Breaking macOS Firewalls

    Patrick Wardle
    Thu, 09:00 - 09:25
    South Seas CDF
  • Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina

    Dominik Maier, Bhargava Shastry, Vincent Ulitzsch
    Thu, 17:00 - 17:50
    Islander FG
  • For the Love of Money: Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems

    Leigh Anne Galloway, Timur Yunusov
    Thu, 15:50 - 16:40
    Islander EI
  • From Bot to Robot: How Abilities and Law Change with Physicality

    Wendy Knox Everette, Brittany Postnikoff, Sara Jayne Terp
    Wed, 11:15 - 12:05
    Lagoon JKL
  • From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities

    Jimmy Su, Wei Wu, Xinyu Xing
    Thu, 14:30 - 15:20
    Islander FG
  • From Workstation to Domain Admin: Why Secure Administration isn't Secure and How to Fix it

    Sean Metcalf
    Wed, 14:40 - 15:30
    South Seas ABE
  • G
  • GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs

    Christopher Domas
    Thu, 11:00 - 11:50
    South Pacific F
  • H
  • Hardening Hyper-V through Offensive Security Research

    Jordan Rabet
    Thu, 15:50 - 16:40
    Lagoon GHI
  • Holding on for Tonight: Addiction in InfoSec

    Jamie Tomasello
    Wed, 10:30 - 10:55
    Islander EI
  • How can Communities Move Forward After Incidents of Sexual Harassment or Assault?

    Makenzie Peterson
    Wed, 17:05 - 17:30
    Tradewinds EF
  • How can Someone with Autism Specifically Enhance the Cyber Security Workforce?

    Rhett Greenhagen, Casey Hurt, Stacy Thayer
    Thu, 14:30 - 15:20
    Tradewinds EF
  • How I Learned to Stop Worrying and Love the SBOM

    Allan Friedman
    Wed, 10:30 - 10:55
    Tradewinds EF
  • I
  • Identity Theft: Attacks on SSO Systems

    Kelby Ludwig
    Thu, 09:45 - 10:35
    South Pacific F
  • I for One Welcome Our New Power Analysis Overlords

    Colin O'flynn
    Wed, 17:05 - 17:30
    Lagoon GHI
  • InfoSec Philosophies for the Corrupt Economy

    Lawrence Munro
    Wed, 17:05 - 17:30
    Islander EI
  • IoT Malware: Comprehensive Survey Analysis Framework and Case Studies

    Andrei Costin, Jonas Zaddach
    Thu, 15:50 - 16:40
    South Pacific F
  • Is the Mafia Taking Over Cybercrime?

    Jonathan Lusthaus
    Wed, 17:05 - 17:30
    South Seas ABE
  • It's a PHP Unserialization Vulnerability Jim but Not as We Know It

    Sam Thomas
    Thu, 17:00 - 17:50
    Lagoon JKL
  • K
  • KeenLab iOS Jailbreak Internals: Userland Read-Only Memory can be Dangerous

    Liang Chen
    Wed, 11:15 - 12:05
    Jasmine Ballroom
  • Kernel Mode Threats and Practical Defenses

    Joe Desimone, Gabriel Landau
    Thu, 09:45 - 10:35
    South Seas ABE
  • L
  • Last Call for SATCOM Security

    Ruben Santamarta
    Thu, 14:30 - 15:20
    South Seas CDF
  • Legal Landmines: How Law and Policy are Rapidly Shaping Information Security

    Leonard Bailey, Allison Bender, Amit Elazari, Jennifer Granick, Joseph Menn, Paul Rosen
    Wed, 13:30 - 14:20
    Islander EI
  • Legal Liability for IOT Cybersecurity Vulnerabilities

    Ijay Palansky
    Thu, 14:30 - 15:20
    Lagoon JKL
  • Lessons and Lulz: The 4th Annual Black Hat USA NOC Report

    Bart Stump, Neil Wyler
    Thu, 17:00 - 17:50
    Lagoon GHI
  • Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines

    Carsten Schuermann
    Thu, 09:00 - 09:25
    Islander FG
  • Lowering the Bar: Deep Learning for Side Channel Analysis

    Baris Ege, Jasper Van Woudenberg
    Thu, 15:50 - 16:40
    Lagoon JKL
  • LTE Network Automation Under Threat

    Ravishankar Borgaonkar, Altaf Shaik
    Wed, 16:00 - 16:50
    Islander FG
  • M
  • Mainframe \[z/OS\] Reverse Engineering and Exploit Development

    Chad Rikansrud
    Thu, 15:50 - 16:40
    Jasmine Ballroom
  • Measuring the Speed of the Red Queen's Race; Adaption and Evasion in Malware

    Felipe Ducau, Richard Harang
    Wed, 10:30 - 10:55
    Lagoon GHI
  • Meltdown: Basics Details Consequences

    Daniel Gruss, Moritz Lipp, Michael Schwarz
    Wed, 14:40 - 15:30
    South Pacific F
  • Mental Health Hacks: Fighting Burnout Depression and Suicide in the Hacker Community

    Christian Dameff, Jerome Radcliffe
    Wed, 14:40 - 15:30
    Islander FG
  • Miasm: Reverse Engineering Framework

    Fabrice Desclaux, Camille Mougey
    Wed, 11:15 - 12:05
    Lagoon GHI
  • Money-rity Report: Using Intelligence to Predict the Next Payment Card Fraud Victims

    Clare Gollnick, Cathal Smyth
    Thu, 09:00 - 09:25
    Tradewinds EF
  • N
  • New Norms and Policies in Cyber-Diplomacy

    James Andrew Lewis, Jane Holl Lute, Jeff Moss, Christopher Painter
    Thu, 09:45 - 10:35
    Jasmine Ballroom
  • New Trends in Browser Exploitation: Attacking Client-Side JIT Compilers

    Samuel Groß
    Wed, 11:15 - 12:05
    Islander FG
  • None of My Pixel is Your Business: Active Watermarking Cancellation Against Video Streaming Service

    Yi Qun Hui, Wang Kang
    Thu, 12:10 - 13:00
    Tradewinds EF
  • No Royal Road … Notes on Dangerous Game

    Mara Tam
    Wed, 13:30 - 14:20
    Jasmine Ballroom
  • O
  • Open Sesame: Picking Locks with Cortana

    Tal Be'ery, Ron Marcovich, Yuval Ron, Amichai Shulman
    Wed, 16:00 - 16:50
    Islander EI
  • Optimistic Dissatisfaction with the Status Quo: Steps We Must Take to Improve Security in Complex Landscapes

    Parisa Tabriz
    Wed, 09:00 - 09:50
    Mandalay Bay Events Center
  • Outsmarting the Smart City

    Dan Crowley, Mauro Paredes, Jennifer Savage
    Thu, 12:10 - 13:00
    Islander EI
  • Over-the-Air: How we Remotely Compromised the Gateway BCM and Autopilot ECUs of Tesla Cars

    Yuefeng Du, Ling Liu, Sen Nie, Wenkai Zhang
    Thu, 17:00 - 17:50
    South Seas CDF
  • P
  • Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives

    Maxwell Bland, Christian Dameff, Jeff Tully
    Thu, 11:00 - 11:50
    Tradewinds EF
  • Playback: A TLS 1.3 Story

    Alfonso Garcia Alguacil, Alejo Murillo Moya
    Thu, 12:10 - 13:00
    Jasmine Ballroom
  • Practical Web Cache Poisoning: Redefining 'Unexploitable'

    James Kettle
    Thu, 15:50 - 16:40
    South Seas CDF
  • Protecting the Protector Hardening Machine Learning Defenses Against Adversarial Attacks

    Jugal Parikh, Holly Stewart, Randy Treit
    Thu, 12:10 - 13:00
    South Seas CDF
  • R
  • Real Eyes Realize Real Lies: Beating Deception Technologies

    Matan Hart
    Thu, 09:00 - 09:25
    Lagoon JKL
  • Reconstruct the World from Vanished Shadow: Recovering Deleted VSS Snapshots

    Minoru Kobayashi, Hiroshi Suzuki
    Thu, 09:45 - 10:35
    Tradewinds EF
  • Remotely Attacking System Firmware

    Oleksandr Bazhaniuk, Jesse Michael, Mickey Shkatov
    Wed, 13:30 - 14:20
    South Pacific F
  • Return of Bleichenbacher's Oracle Threat (ROBOT)

    Hanno Böck, Craig Young
    Thu, 17:00 - 17:50
    Tradewinds EF
  • Reversing a Japanese Wireless SD Card - From Zero to Code Execution

    Guillaume Valadon
    Wed, 13:30 - 14:20
    Lagoon JKL
  • S
  • Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers

    Giovanni Camurati, Aurélien Francillon, Tom Hayes, Marius Muench, Sebastian Poeplau
    Wed, 13:30 - 14:20
    South Seas ABE
  • SDL That Won't Break the Bank

    Steve Lipner
    Thu, 15:50 - 16:40
    Islander FG
  • SirenJack: Cracking a 'Secure' Emergency Warning Siren System

    Balint Seeber
    Thu, 15:50 - 16:40
    Tradewinds EF
  • Snooping on Cellular Gateways and Their Critical Role in ICS

    Justin Shattuck
    Thu, 09:45 - 10:35
    Lagoon JKL
  • Software Attacks on Hardware Wallets

    Sergei Volokitin
    Wed, 10:30 - 10:55
    South Seas ABE
  • So I became a Domain Controller

    Benjamin Delpy, Vincent Le Toux
    Thu, 12:10 - 13:00
    South Pacific F
  • Squeezing a Key through a Carry Bit

    Filippo Valsorda
    Wed, 16:00 - 16:50
    Tradewinds EF
  • Stealth Mango and the Prevalence of Mobile Surveillanceware

    Andrew Blaich, Michael Flossman
    Thu, 11:00 - 11:50
    Jasmine Ballroom
  • Stop that Release There's a Vulnerability!

    Christine Gadsby
    Thu, 09:00 - 09:25
    Islander EI
  • Stress and Hacking: Understanding Cognitive Stress in Tactical Cyber Ops

    Josiah Dykstra, Celeste Paul
    Wed, 11:15 - 12:05
    Islander EI
  • Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology

    Lee Christensen, Matthew Graeber
    Wed, 14:40 - 15:30
    Lagoon JKL
  • T
  • The Air-Gap Jumpers

    Mordechai Guri
    Wed, 17:05 - 17:30
    South Pacific F
  • The Finest Penetration Testing Framework for Software-Defined Networks

    Jinwoo Kim, Seungsoo Lee, Seungwon Shin, Seungwon Woo
    Thu, 17:00 - 17:50
    Islander EI
  • The Problems and Promise of WebAssembly

    Natalie Silvanovich
    Thu, 09:00 - 09:25
    Jasmine Ballroom
  • There will be Glitches: Extracting and Analyzing Automotive Firmware Efficiently

    Alyssa Milburn, Santiago Cordoba Pellicer, Niek Timmers, Ramiro Pareja Veredas, Nils Wiersma, Marc Witteman
    Wed, 13:30 - 14:20
    Islander FG
  • The Science of Hiring and Retaining Female Cybersecurity Engineers

    Ashley Holtz
    Thu, 09:45 - 10:35
    Islander FG
  • The Unbearable Lightness of BMC's

    Matias Sebastian Soler, Nicolas Waisman
    Wed, 14:40 - 15:30
    Tradewinds EF
  • The Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet

    Alex Ionescu, Gabrielle Viala
    Thu, 09:45 - 10:35
    South Seas CDF
  • Threat Modeling in 2018: Attacks Impacts and Other Updates

    Adam Shostack
    Wed, 14:40 - 15:30
    Islander EI
  • TLBleed: When Protecting Your CPU Caches is Not Enough

    Ben Gras
    Thu, 12:10 - 13:00
    Lagoon GHI
  • Too Soft\[ware Defined\] Networks: SD-WAN Vulnerability Assessment

    Sergey Gordeychik, Aleksandr Timorin
    Wed, 13:30 - 14:20
    Tradewinds EF
  • TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems Forever

    Andrea Carcano, Younes Dragoni, Marina Krotofil
    Wed, 11:15 - 12:05
    Tradewinds EF
  • Two-Factor Authentication Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key

    L Jean Camp, Sanchari Das, Gianpaolo Russo
    Thu, 09:00 - 09:25
    South Pacific F
  • U
  • Understanding and Exploiting Implanted Medical Devices

    Jonathan Butts, Billy Rios
    Thu, 15:50 - 16:40
    South Seas ABE
  • Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library

    Maddie Stone
    Thu, 17:00 - 17:50
    Jasmine Ballroom
  • W
  • WebAssembly: A New World of Native Exploits on the Browser

    Justin Engler, Tyler Lukasiewicz
    Thu, 12:10 - 13:00
    Islander FG
  • Why so Spurious? How a Highly Error-Prone x86/x64 CPU Feature can be Abused to Achieve Local Privilege Escalation on Many Operating Systems

    Nemanja Mulasmajic, Nicolas Peterson
    Wed, 16:00 - 16:50
    Jasmine Ballroom
  • Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator

    Alex Bulazel
    Thu, 14:30 - 15:20
    Islander EI
  • WireGuard: Next Generation Secure Network Tunnel

    Jason Donenfeld
    Wed, 14:40 - 15:30
    Lagoon GHI
  • Wrangling with the Ghost: An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities

    Christopher Ertl, Anders Fogh, Matt Miller
    Thu, 12:10 - 13:00
    Lagoon JKL
  • Y
  • Your Voice is My Passport

    Azeem Aqil, John Seymour
    Thu, 09:45 - 10:35
    Lagoon GHI
  • Z
  • ZEROing Trust: Do Zero Trust Approaches Deliver Real Security?

    David Weston
    Wed, 16:00 - 16:50
    South Seas CDF