• Saturday, January 19
  • High Confidence Malware Attribution using the Rich Header

    Kevin Bilzer, Seamus Burke, RJ Joyce
    Sat, 10:00 - 10:50
    Belay It room - Belay It
  • BECs and Beyond: Investigating and Defending Office 365

    Doug Bienstock
    Sat, 11:00 - 11:50
    Belay It room - Belay It
  • Five-sigma Network Events (and how to find them)

    John O’Neil
    Sat, 12:00 - 12:50
    Belay It room - Belay It
  • Electronic Voting in 2018: Bad or Worse?

    Matt Blaze
    Sat, 14:00 - 14:50
    Belay It room - Belay It
  • Analyzing Shodan Images With Optical Character Recognition

    Michael Portera
    Sat, 15:00 - 15:20
    Belay It room - Belay It
  • Security Response Survival Skills

    Ben Ridgway
    Sat, 15:30 - 15:50
    Belay It room - Belay It
  • iPhone Surgery for the Practically Paranoid

    Rudy Cuevas, Evan Jensen
    Sat, 16:00 - 16:20
    Belay It room - Belay It
  • A Code Pirate’s Cutlass: Recovering Software Architecture from Embedded Binaries

    evm
    Sat, 16:30 - 16:50
    Belay It room - Belay It
  • 0wn the Con

    The Shmoo Group
    Sat, 17:00 - 17:50
    Belay It room - Belay It
  • Sunday, January 20
  • Looking for Malicious Hardware Implants with Minimal Equipment

    Falcon Darkstar
    Sun, 10:00 - 10:50
    Belay It room - Belay It
  • Un-f*$#ing Cloud Storage Encryption

    Adam Everspaugh
    Sun, 11:00 - 11:50
    Belay It room - Belay It
  • IMSI Catchers Demystified

    Karl Koscher
    Sun, 12:00 - 12:50
    Belay It room - Belay It