KEYNOTE - DAY ONE
MAINFRAMES: THE PAST WILL COME BACK TO HAUNT YOU
BLACK-BOX ASSESSMENT OF PSEUDORANDOM ALGORITHMS
END-TO-END ANALYSIS OF A DOMAIN GENERATING ALGORITHM MALWARE FAMILY
JAVASCRIPT STATIC SECURITY ANALYSIS MADE EASY WITH JSPRIME
THE WEB IS VULNERABLE: XSS DEFENSE ON THE BATTLEFRONT
MALICIOUS FILE FOR EXPLOITING FORENSIC SOFTWARE
KEYNOTE - TAKE RISK, DON’T FAIL
CMX: IEEE CLEAN FILE METADATA EXCHANGE
MOBILE MALWARE: WHY THE TRADITIONAL AV PARADIGM IS DOOMED AND HOW TO USE PHYSICS TO DETECT UNDESIRABLE ROUTINES
BOCHSPWN: IDENTIFYING 0-DAYS VIA SYSTEM-WIDE MEMORY ACCESS PATTERN ANALYSIS
USING ONLINE ACTIVITY AS DIGITAL FINGERPRINTS TO CREATE A BETTER SPEAR PHISHER
CREEPYDOL: CHEAP, DISTRIBUTED STALKING
OPTIROP: HUNTING FOR ROP GADGETS IN STYLE