• Friday, October 5
  • The History of the Future of Cyber-Education

    Winn Schwartau
    Fri, 12:00 - 12:50
    Kentucky F & G - Track 4
  • State of Win32k Security: Revisiting Insecure design

    Vishal Chauhan
    Fri, 13:00 - 13:50
    Kentucky F & G - Track 4
  • Offensive Browser Extension Development

    Michael Weber
    Fri, 14:00 - 14:50
    Kentucky F & G - Track 4
  • Protect Your Payloads: Modern Keying Techniques

    Leo Loobeek
    Fri, 15:00 - 15:50
    Kentucky F & G - Track 4
  • Jump Into IOT Hacking with the Damn Vulnerable Habit Helper Device

    Nancy Snoke, Phoenix Snoke
    Fri, 16:00 - 16:50
    Kentucky F & G - Track 4
  • In-Memory Persistence: Terminate & Stay Resident Redux

    Scott Lundgren
    Fri, 17:00 - 17:50
    Kentucky F & G - Track 4
  • Saturday, October 6
  • Disaster Strikes: A Hacker's Cook book

    Carlos Perez, Jose Quinones
    Sat, 09:00 - 09:50
    Kentucky F & G - Track 4
  • Ninja Looting Like a Pirate

    infojanitor
    Sat, 10:00 - 10:50
    Kentucky F & G - Track 4
  • Hacking Mobile Applications with Frida

    David Coursey
    Sat, 12:00 - 12:50
    Kentucky F & G - Track 4
  • Victor or Victim? Strategies for Avoiding an InfoSec Cold War

    Jason Lang, Stuart McIntosh
    Sat, 13:00 - 13:50
    Kentucky F & G - Track 4
  • Ubiquitous Shells

    Jon Gorenflo
    Sat, 14:00 - 14:50
    Kentucky F & G - Track 4
  • 99 Reasons Your Perimeter Is Leaking - Evolution of C&C

    John Askew
    Sat, 15:00 - 15:50
    Kentucky F & G - Track 4
  • Ship Hacking: a Primer for Today’s Pirate

    Brian Olson, Brian Satira
    Sat, 16:00 - 16:50
    Kentucky F & G - Track 4
  • Code Execution with JDK Scripting Tools & Nashorn Javascript Engine

    Brett Hawkins
    Sat, 17:00 - 17:50
    Kentucky F & G - Track 4
  • PHONOPTICON - leveraging low-rent mobile ad services to achieve state-actor level mass surveillance on a shoestring budget

    Mark Milhouse
    Sat, 18:00 - 18:50
    Kentucky F & G - Track 4
  • Sunday, October 7
  • Bug Hunting in RouterOS

    Jacob Baines
    Sun, 09:00 - 09:50
    Kentucky F & G - Track 4
  • Breaking Into Your Building: A Hackers Guide to Unauthorized Access

    Tim Roberts, Brent White
    Sun, 10:00 - 10:50
    Kentucky F & G - Track 4
  • The making of an iOS 11 jailbreak: Kiddie to kernel hacker in 14 sleepless nights.

    Bryce Bearchell
    Sun, 11:00 - 11:50
    Kentucky F & G - Track 4
  • Who Watches the Watcher? Detecting Hypervisor Introspection from Unprivileged Guests

    Tomasz Tuzel
    Sun, 12:00 - 12:50
    Kentucky F & G - Track 4
  • Pwning in the Sandbox: OSX Macro Exploitation & Beyond

    Danny Chrastil, Adam Gold
    Sun, 13:00 - 13:50
    Kentucky F & G - Track 4
  • IOCs Today, Intelligence-Led Security Tomorrow

    Katie Kusjanovic, Matthew Shelton
    Sun, 14:00 - 14:50
    Kentucky F & G - Track 4