ABOVE MY PAY GRADE: CYBER RESPONSE AT THE NATIONAL LEVEL
ABUSING WEB APIS THROUGH SCRIPTED ANDROID APPLICATIONS
ANDROID: ONE ROOT TO OWN THEM ALL
A PRACTICAL ATTACK AGAINST MDM SOLUTIONS
A TALE OF ONE SOFTWARE BYPASS OF WINDOWS 8 SECURE BOOT
BEYOND THE APPLICATION: CELLULAR PRIVACY REGULATION SPACE
BIG DATA FOR WEB APPLICATION SECURITY
BINARYPIG - SCALABLE MALWARE ANALYTICS IN HADOOP
BIOS SECURITY
BLACKBERRYOS 10 FROM A SECURITY PERSPECTIVE
BLACK-BOX ASSESSMENT OF PSEUDORANDOM ALGORITHMS
BLUETOOTH SMART: THE GOOD, THE BAD, THE UGLY, AND THE FIX!
BOCHSPWN: IDENTIFYING 0-DAYS VIA SYSTEM-WIDE MEMORY ACCESS PATTERN ANALYSIS
BUGALYZE.COM - DETECTING BUGS USING DECOMPILATION AND DATA FLOW ANALYSIS
BUYING INTO THE BIAS: WHY VULNERABILITY STATISTICS SUCK
CLICKJACKING REVISITED: A PERCEPTUAL VIEW OF UI SECURITY
CMX: IEEE CLEAN FILE METADATA EXCHANGE
COMBATING THE INSIDER THREAT AT THE FBI: REAL WORLD LESSONS LEARNED
COMPROMISING INDUSTRIAL FACILITIES FROM 40 MILES AWAY
CREEPYDOL: CHEAP, DISTRIBUTED STALKING
CROWDSOURCE: AN OPEN SOURCE, CROWD TRAINED MACHINE LEARNING MODEL FOR MALWARE CAPABILITY DETECTION
DEFENDING NETWORKS WITH INCOMPLETE INFORMATION: A MACHINE LEARNING APPROACH
DENIAL OF SERVICE AS A SERVICE - ASYMMETRICAL WARFARE AT ITS FINEST
DENYING SERVICE TO DDOS PROTECTION SERVICES
DISSECTING CSRF ATTACKS & COUNTERMEASURES
END-TO-END ANALYSIS OF A DOMAIN GENERATING ALGORITHM MALWARE FAMILY
ENERGY FRAUD AND ORCHESTRATED BLACKOUTS: ISSUES WITH WIRELESS METERING PROTOCOLS (WM-BUS)
EVADING DEEP INSPECTION FOR FUN AND SHELL
EXPLOITING NETWORK SURVEILLANCE CAMERAS LIKE A HOLLYWOOD HACKER
FACT AND FICTION: DEFENDING YOUR MEDICAL DEVICES
FULLY ARBITRARY 802.3 PACKET INJECTION: MAXIMIZING THE ETHERNET ATTACK SURFACE
FUNDERBOLT: ADVENTURES IN THUNDERBOLT DMA ATTACKS
HACKING LIKE IN THE MOVIES: VISUALIZING PAGE TABLES FOR LOCAL EXPLOITATION
HACKING, SURVEILLING, AND DECEIVING VICTIMS ON SMART TV
HIDING @ DEPTH - EXPLORING, SUBVERTING AND BREAKING NAND FLASH MEMORY
HOME INVASION V2.0 - ATTACKING NETWORK-CONTROLLED HARDWARE
HONEY, I’M HOME!! - HACKING Z-WAVE HOME AUTOMATION SYSTEMS
HOT KNIVES THROUGH BUTTER: BYPASSING AUTOMATED ANALYSIS SYSTEMS
HOW CVSS IS DOSSING YOUR PATCHING POLICY (AND WASTING YOUR MONEY)
HOW TO BUILD A SPYPHONE
HOW TO GROW A TREE (TAINT-ENABLED REVERSE ENGINEERING ENVIRONMENT) FROM CBASS (CROSS-PLATFORM BINARY AUTOMATED SYMBOLIC-EXECUTION SYSTEM)
HUNTING THE SHADOWS: IN DEPTH ANALYSIS OF ESCALATED APT ATTACKS
I CAN HEAR YOU NOW: TRAFFIC INTERCEPTION AND REMOTE MOBILE PHONE CLONING WITH A COMPROMISED CDMA FEMTOCELL
IMPLANTABLE MEDICAL DEVICES: HACKING HUMANS
IS THAT A GOVERNMENT IN YOUR NETWORK OR ARE YOU JUST HAPPY TO SEE ME?
JAVA EVERY-DAYS: EXPLOITING SOFTWARE RUNNING ON 3 BILLION DEVICES
JAVASCRIPT STATIC SECURITY ANALYSIS MADE EASY WITH JSPRIME
JTAGULATOR: ASSISTED DISCOVERY OF ON-CHIP DEBUG INTERFACES
JUST-IN-TIME CODE REUSE: THE MORE THINGS CHANGE, THE MORE THEY STAY THE SAME
KEYNOTE - DAY ONE
KEYNOTE - TAKE RISK, DON’T FAIL
LAWFUL ACCESS PANEL
LEGAL ASPECTS OF FULL SPECTRUM COMPUTER NETWORK (ACTIVE) DEFENSE
LEGAL CONSIDERATIONS FOR CELLULAR RESEARCH
LESSONS FROM SURVIVING A 300GBPS DENIAL OF SERVICE ATTACK
LET'S GET PHYSICAL: BREAKING HOME SECURITY SYSTEMS AND BYPASSING BUILDINGS CONTROLS
LTE BOOMS WITH VULNERABILITIES
MACTANS: INJECTING MALWARE INTO IOS DEVICES VIA MALICIOUS CHARGERS
MAINFRAMES: THE PAST WILL COME BACK TO HAUNT YOU
MALICIOUS FILE FOR EXPLOITING FORENSIC SOFTWARE
MALTEGO TUNGSTEN AS A COLLABORATIVE ATTACK PLATFORM
METHODOLOGIES FOR HACKING EMBEDDED SECURITY APPLIANCES
MILLION BROWSER BOTNET
MOBILE MALWARE: WHY THE TRADITIONAL AV PARADIGM IS DOOMED AND HOW TO USE PHYSICS TO DETECT UNDESIRABLE ROUTINES
MOBILE ROOTKITS: EXPLOITING AND ROOTKITTING ARM TRUSTZONE
MULTIPLEXED WIRED ATTACK SURFACES
NEW TRENDS IN FASTFLUX NETWORKS
OPSEC FAILURES OF SPIES
OPTIROP: HUNTING FOR ROP GADGETS IN STYLE
OUT OF CONTROL: DEMONSTRATING SCADA DEVICE EXPLOITATION
OWNING THE ROUTING TABLE - PART II
PASS-THE-HASH 2: THE ADMIN'S REVENGE
PASS THE HASH AND OTHER CREDENTIAL THEFT AND REUSE: MITIGATING THE RISK OF LATERAL MOVEMENT AND PRIVILEGE ESCALATION
PASSWORD HASHING: THE FUTURE IS NOW
PDF ATTACK: A JOURNEY FROM THE EXPLOIT KIT TO THE SHELLCODE
PIXEL PERFECT TIMING ATTACKS WITH HTML5
POST EXPLOITATION OPERATIONS WITH CLOUD SYNCHRONIZATION SERVICES
POWER ANALYSIS ATTACKS FOR CHEAPSKATES
PREDICTING SUSCEPTIBILITY TO SOCIAL BOTS ON TWITTER
PRESS ROOT TO CONTINUE: DETECTING OSX AND WINDOWS BOOTKITS WITH RDFU
REVEALING EMBEDDED FINGERPRINTS: DERIVING INTELLIGENCE FROM USB STACK INTERACTIONS
RFID HACKING: LIVE FREE OR RFID HARD
ROOTING SIM CARDS
SHATTERING ILLUSIONS IN LOCK-FREE WORLDS: COMPILER/HARDWARE BEHAVIORS IN OSES AND VMS
SMASHING THE FONT SCALER ENGINE IN WINDOWS KERNEL
SPY-JACKING THE BOOTERS
SSL, GONE IN 30 SECONDS - A BREACH BEYOND CRIME
STEPPING P3WNS: ADVENTURES IN FULL-SPECTRUM EMBEDDED EXPLOITATION (AND DEFENSE!)
TERIDIAN SOC EXPLOITATION: EXPLORATION OF HARVARD ARCHITECTURE SMART GRID SYSTEMS
THE FACTORING DEAD: PREPARING FOR THE CRYPTOPOCALYPSE
THE OUTER LIMITS: HACKING THE SAMSUNG SMART TV
THE SCADA THAT DIDN'T CRY WOLF- WHO'S REALLY ATTACKING YOUR ICS DEVICES- PART DEUX!
THE WEB IS VULNERABLE: XSS DEFENSE ON THE BATTLEFRONT
TLS 'SECRETS'
TOR... ALL-THE-THINGS!
TOWN HALL MEETING: CFAA REFORM STRATEGY
TRUNCATING TLS CONNECTIONS TO VIOLATE BELIEFS IN WEB APPLICATIONS
UART THOU MAD?
') UNION SELECT `THIS_TALK` AS ('NEW OPTIMIZATION AND OBFUSCATION TECHNIQUES’)%00
UNIVERSAL DDOS MITIGATION BYPASS
UNTWINING TWINE
USING ONLINE ACTIVITY AS DIGITAL FINGERPRINTS TO CREATE A BETTER SPEAR PHISHER
VIRTUAL DEOBFUSCATOR - A DARPA CYBER FAST TRACK FUNDED EFFORT
WHAT SECURITY RESEARCHERS NEED TO KNOW ABOUT ANTI-HACKING LAW
WHAT'S ON THE WIRE? PHYSICAL LAYER TAPPING WITH PROJECT DAISHO
WITH BIGDATA COMES BIG RESPONSIBILITY: PRACTICAL EXPLOITING OF MDX INJECTIONS