0wn the Con
Ask the EFF
Attack on Titans: A Survey of New Attacks Against Big Data and Machine Learning
AVLeak: Turning Antivirus Emulators Inside Out
Be Free, Little GuardBunny!
Breaking Bulbs Briskly by Bogus Broadcasts
Building an Encyclopedia of Malware Configs (to punch miscreants)
Closing Plenary: Information Security Programs in Academia
Closing Remarks
Compressed Context Based Analytic Results for Use in Computer Vision System for Network Defense
Containing an Attack with Linux Containers and AppArmor/SELinux
Crypto and Quantum and Post Quantum
Exploiting Memory Corruption Vulnerabilities on the FreeRTOS Operating System
Gatekeeper Exposed
Hacking The Wireless World — Software Defined Radio Exploits
Hiding from the Investigator: Understanding OS X and iOS Code Signing to Hide Data
Keynote
LostPass: Pixel-perfect LastPass Phishing
LTE Security and Protocol Exploits
Making Milware: An Interdisciplinary Tryst
My Hash is My Passport: Understanding Web and Mobile Authentication
No Easy Breach: Challenges and Lessons Learned from an Epic Investigation
Online, No One Knows You’re Dead
Opening Remarks, Rumblings, Ruminations, and Rants
OSX Vulnerability Research and Why We Wrote Our Own Debugger
Penetration Testing Custom TLS Stacks
(P|G)Ohst Exploitation
Political Pwnage: The Hacker’s Guide to Cybersecurity Policy
Resistance is Futile: SDN Assimilating Our Networks
Reverse-Engineering Wireless SCADA Systems
Software Security by the Numbers
Speak Security and Enter: Better Ways to Communicate with Non-Technical Users
Static Malware and SMTP Mail Analysis using General Purpose Graphical Processing Units (GPGPU)
The Road to SYSTEM: Recycling Old Vulnerabilities for Unpatched Privilege Escalation and A New Network Attack
#thingswikfound #omarax: What is it, and why you may care?
This Message Will Self-Destruct in 10 Seconds: Avoiding Bilateral Enucleation
Users Are People Too: How to Make Your Tools Not Suck for Humans
Using the Algebraic Eraser to Secure Low-Power and Passive IoT Devices
Where Do the Phishers Live? Collecting Phishers’ Geographic Locations from Automated Honeypots
You Ain’t Seen Nothing Yet: New Paradigms for Policy, Regulation, and Community Engagement