• 0
  • 0wn the Con

    The Shmoo Group
    Sat, 17:00 - 17:50
    Belay It room - Belay It
  • 2
  • 24/7 CTI: Operationalizing Cyber Threat Intelligence

    Xena Olsen
    Sat, 17:00 - 17:50
    Build It Room - Build It
  • A
  • A Code Pirate’s Cutlass: Recovering Software Architecture from Embedded Binaries

    evm
    Sat, 16:30 - 16:50
    Belay It room - Belay It
  • Ad-Laundering: Bribes & Backdoors

    John Amirrezvani
    Fri, 16:00 - 16:20
    Main Room - One Track Mind
  • Advancing a Scientific Approach to Security Tool Evaluations with MITRE ATT&CK™

    Francis Duff
    Sat, 15:00 - 15:20
    Main Room - Bring It On
  • A Little Birdy Told Me About Your Warrants

    Avi Zajac
    Sat, 16:00 - 16:20
    Main Room - Bring It On
  • Analyzing Shodan Images With Optical Character Recognition

    Michael Portera
    Sat, 15:00 - 15:20
    Belay It room - Belay It
  • A Tisket, a Tasket, a Dark Web Shopping Basket

    Anne Addison Meriwether, Emma Zaballos
    Sat, 16:30 - 16:50
    Main Room - Bring It On
  • B
  • Be an IoT Safety Hero: Policing Unsafe IoT through the Consumer Product Safety Commission

    Elliot Kaye, Andrea Matwyshyn
    Sat, 14:00 - 14:50
    Build It Room - Build It
  • BECs and Beyond: Investigating and Defending Office 365

    Doug Bienstock
    Sat, 11:00 - 11:50
    Belay It room - Belay It
  • Behind Enemy Lines: Inside the operations of a nation state’s cyber program

    Andrew Blaich, Michael Flossman
    Sat, 17:00 - 17:50
    Main Room - Bring It On
  • Building and Selling Solo, an Open Source Secure Hardware Token

    Conor Patrick
    Sun, 10:00 - 10:50
    Build It Room - Build It
  • C
  • Closing Plenary: Between Two Moose

    LoST, Whitney Merrill, Andrew Morris, Bruce Potter
    Sun, 13:00 - 13:50
    Main Room - One Track Mind
  • Closing Remarks

     
    Sun, 14:00 - 15:00
    Main Room - One Track Mind
  • CryptoLocker Deep-Dive: Tracking security threats on the Bitcoin public ledger

    Nicolas Kseib, Olivia Thet
    Sat, 11:00 - 11:50
    Build It Room - Build It
  • D
  • Deconstructing DeFeNeStRaTe.C

    Soldier of FORTRAN
    Sun, 10:00 - 10:50
    Main Room - Bring It On
  • E
  • Electronic Voting in 2018: Bad or Worse?

    Matt Blaze
    Sat, 14:00 - 14:50
    Belay It room - Belay It
  • Encrypting the Web Isn’t Enough: How EFF Plans to Encrypt the Entire Internet

    Jeremy Gillula
    Sun, 12:00 - 12:50
    Main Room - Bring It On
  • É
  • Équipe Rouge: The Ethics of Prosecuting An Offensive Security Campaign

    Roy Iversen, Tarah Wheeler
    Fri, 19:50 - 20:05
    Main Room - FireTalks
  • F
  • Firemen vs. Safety Matches: How the current skills pipeline is wrong

    Amélie E. Koran
    Sat, 12:00 - 12:50
    Main Room - Bring It On
  • Firetalks Closing

     
    Fri, 21:10 - 21:15
    Main Room - FireTalks
  • Firetalks Opening

     
    Fri, 19:00 - 19:05
    Main Room - FireTalks
  • Five-sigma Network Events (and how to find them)

    John O’Neil
    Sat, 12:00 - 12:50
    Belay It room - Belay It
  • G
  • Ground Truth: 18 vendors, 6000 firmware images, 2.7 million binaries, and a flaw in the Linux/MIPS stack

    Tim Carstens, Mudge, Parker Thompson
    Sat, 14:00 - 14:50
    Main Room - Bring It On
  • H
  • High Confidence Malware Attribution using the Rich Header

    Kevin Bilzer, Seamus Burke, RJ Joyce
    Sat, 10:00 - 10:50
    Belay It room - Belay It
  • How the Press Gets Pwned

    David Huerta
    Fri, 17:00 - 17:20
    Main Room - One Track Mind
  • I
  • IMSI Catchers Demystified

    Karl Koscher
    Sun, 12:00 - 12:50
    Belay It room - Belay It
  • Incident Response and the Attorney Client Privilege

    Wendy Knox Everette
    Fri, 15:30 - 15:50
    Main Room - One Track Mind
  • Infosec and 9-1-1: When the Location of Your Emergency is in the Building

    Christine Giglio
    Fri, 20:30 - 20:45
    Main Room - FireTalks
  • iPhone Surgery for the Practically Paranoid

    Rudy Cuevas, Evan Jensen
    Sat, 16:00 - 16:20
    Belay It room - Belay It
  • IPv666: Address of the Beast

    Chris Grayson, Marc Newlin
    Sun, 11:00 - 11:50
    Build It Room - Build It
  • It’s 2019 and Special Agent Johnny Still Can’t Encrypt

    Matt Blaze
    Fri, 18:00 - 18:20
    Main Room - One Track Mind
  • K
  • Kinder Garten Security: Teaching the Pre-college Crowd

    Sandra Gorka, Jacob Miller
    Fri, 17:30 - 17:50
    Main Room - One Track Mind
  • L
  • Looking for Malicious Hardware Implants with Minimal Equipment

    Falcon Darkstar
    Sun, 10:00 - 10:50
    Belay It room - Belay It
  • M
  • Machine Learning Models that Predict Mental Health Status on Twitter and Their Privacy Implications

    Rachel Greenstadt, Janith Weerasingh
    Fri, 16:30 - 16:50
    Main Room - One Track Mind
  • Mentoring the Intelligent Deviant: What the special operations and infosec communities can learn from each other

    Paul Brister, Nina Kollars
    Sat, 15:30 - 15:50
    Main Room - Bring It On
  • O
  • Opening Remarks, Rumblings, Ruminations, and Rants

     
    Fri, 14:00 - 15:30
    Main Room - One Track Mind
  • P
  • Patchwerk: Kernel Patching for Fun and Profit

    Jewell Seay, Parker Wiksell
    Sun, 12:00 - 12:50
    Build It Room - Build It
  • Post-quantum Crypto: Today’s defense against tomorrow’s quantum hacker

    Christian Paquin
    Sat, 16:30 - 16:50
    Build It Room - Build It
  • Process Control Through Counterfeit Comms: Using and Abusing Built-In Functionality to Own a PLC

    Jared Rittle
    Sat, 12:00 - 12:50
    Build It Room - Build It
  • R
  • Reversing SR-IOV For Fun and Profit

    Adir Abraham
    Sun, 11:00 - 11:50
    Main Room - Bring It On
  • S
  • Security Response Survival Skills

    Ben Ridgway
    Sat, 15:30 - 15:50
    Belay It room - Belay It
  • Shut up and Listen

    Kristen Renner
    Fri, 19:10 - 19:25
    Main Room - FireTalks
  • Social Network Analysis: A scary primer

    Phil Vachon, Andrew Wong
    Sat, 15:30 - 15:50
    Build It Room - Build It
  • Specialists versus Jack-Of-All-Trades

    Nicole Schwartz
    Fri, 19:30 - 19:45
    Main Room - FireTalks
  • T
  • The APT at Home: The attacker that knows your mother’s maiden name

    Chris Cox
    Sat, 11:00 - 11:50
    Main Room - Bring It On
  • The Beginner’s Guide to the Musical Scales of Cyberwar

    Jessica Malekos Smith
    Sat, 10:00 - 10:50
    Main Room - Bring It On
  • Three Ways DuckDuckGo Protects User Privacy While Getting Things Done (and how you can too)

    Marc Soda
    Sat, 16:00 - 16:20
    Build It Room - Build It
  • Trip Wire(less)

    Omaha
    Sat, 15:00 - 15:20
    Build It Room - Build It
  • U
  • Un-f*$#ing Cloud Storage Encryption

    Adam Everspaugh
    Sun, 11:00 - 11:50
    Belay It room - Belay It
  • W
  • Weapons of Text Destruction

    Jared Stroud
    Fri, 20:10 - 20:25
    Main Room - FireTalks
  • Whats the latest 411 on 419s?

    Ray [Redacted]
    Fri, 20:50 - 21:05
    Main Room - FireTalks
  • Writing a Fuzzer for Any Language with American Fuzzy Lop

    Ariel Zelivansky
    Sat, 10:00 - 10:50
    Build It Room - Build It