International Ballroom, West (farthest away)
High Confidence Malware Attribution using the Rich Header
BECs and Beyond: Investigating and Defending Office 365
Five-sigma Network Events (and how to find them)
Electronic Voting in 2018: Bad or Worse?
Analyzing Shodan Images With Optical Character Recognition
Security Response Survival Skills
iPhone Surgery for the Practically Paranoid
A Code Pirate’s Cutlass: Recovering Software Architecture from Embedded Binaries
0wn the Con
Looking for Malicious Hardware Implants with Minimal Equipment
Un-f*$#ing Cloud Storage Encryption
IMSI Catchers Demystified