KEYNOTE - DAY ONE
MAINFRAMES: THE PAST WILL COME BACK TO HAUNT YOU
BLACKBERRYOS 10 FROM A SECURITY PERSPECTIVE
WITH BIGDATA COMES BIG RESPONSIBILITY: PRACTICAL EXPLOITING OF MDX INJECTIONS
NEW TRENDS IN FASTFLUX NETWORKS
LESSONS FROM SURVIVING A 300GBPS DENIAL OF SERVICE ATTACK
COMBATING THE INSIDER THREAT AT THE FBI: REAL WORLD LESSONS LEARNED
BEYOND THE APPLICATION: CELLULAR PRIVACY REGULATION SPACE
JAVA EVERY-DAYS: EXPLOITING SOFTWARE RUNNING ON 3 BILLION DEVICES
HOW TO BUILD A SPYPHONE
PRACTICAL PENTESTING OF ERPS AND BUSINESS APPLICATIONS
METHODOLOGIES FOR HACKING EMBEDDED SECURITY APPLIANCES
CROWDSOURCE: AN OPEN SOURCE, CROWD TRAINED MACHINE LEARNING MODEL FOR MALWARE CAPABILITY DETECTION
LEGAL CONSIDERATIONS FOR CELLULAR RESEARCH
BLACK-BOX ASSESSMENT OF PSEUDORANDOM ALGORITHMS
SHATTERING ILLUSIONS IN LOCK-FREE WORLDS: COMPILER/HARDWARE BEHAVIORS IN OSES AND VMS
POWER ANALYSIS ATTACKS FOR CHEAPSKATES
DENYING SERVICE TO DDOS PROTECTION SERVICES
WHAT SECURITY RESEARCHERS NEED TO KNOW ABOUT ANTI-HACKING LAW
JUST-IN-TIME CODE REUSE: THE MORE THINGS CHANGE, THE MORE THEY STAY THE SAME
A TALE OF ONE SOFTWARE BYPASS OF WINDOWS 8 SECURE BOOT
TLS 'SECRETS'
MILLION BROWSER BOTNET
PASSWORD HASHING: THE FUTURE IS NOW
DENIAL OF SERVICE AS A SERVICE - ASYMMETRICAL WARFARE AT ITS FINEST
END-TO-END ANALYSIS OF A DOMAIN GENERATING ALGORITHM MALWARE FAMILY
PASS THE HASH AND OTHER CREDENTIAL THEFT AND REUSE: MITIGATING THE RISK OF LATERAL MOVEMENT AND PRIVILEGE ESCALATION
FACT AND FICTION: DEFENDING YOUR MEDICAL DEVICES
UNIVERSAL DDOS MITIGATION BYPASS
LEGAL ASPECTS OF FULL SPECTRUM COMPUTER NETWORK (ACTIVE) DEFENSE
BIOS SECURITY
I CAN HEAR YOU NOW: TRAFFIC INTERCEPTION AND REMOTE MOBILE PHONE CLONING WITH A COMPROMISED CDMA FEMTOCELL
LAWFUL ACCESS PANEL
EVADING DEEP INSPECTION FOR FUN AND SHELL
EMBEDDED DEVICES SECURITY AND FIRMWARE REVERSE ENGINEERING
PDF ATTACK: A JOURNEY FROM THE EXPLOIT KIT TO THE SHELLCODE
JAVASCRIPT STATIC SECURITY ANALYSIS MADE EASY WITH JSPRIME
HOW TO GROW A TREE (TAINT-ENABLED REVERSE ENGINEERING ENVIRONMENT) FROM CBASS (CROSS-PLATFORM BINARY AUTOMATED SYMBOLIC-EXECUTION SYSTEM)
MALTEGO TUNGSTEN AS A COLLABORATIVE ATTACK PLATFORM
UNTWINING TWINE
A PRACTICAL ATTACK AGAINST MDM SOLUTIONS
TOR... ALL-THE-THINGS!
BUYING INTO THE BIAS: WHY VULNERABILITY STATISTICS SUCK
CLICKJACKING REVISITED: A PERCEPTUAL VIEW OF UI SECURITY
LET'S GET PHYSICAL: BREAKING HOME SECURITY SYSTEMS AND BYPASSING BUILDINGS CONTROLS
LTE BOOMS WITH VULNERABILITIES
TRUNCATING TLS CONNECTIONS TO VIOLATE BELIEFS IN WEB APPLICATIONS
OPSEC FAILURES OF SPIES
THE WEB IS VULNERABLE: XSS DEFENSE ON THE BATTLEFRONT
PREDICTING SUSCEPTIBILITY TO SOCIAL BOTS ON TWITTER
BINARYPIG - SCALABLE MALWARE ANALYTICS IN HADOOP
SMASHING THE FONT SCALER ENGINE IN WINDOWS KERNEL
PIXEL PERFECT TIMING ATTACKS WITH HTML5
ROOTING SIM CARDS
HOW CVSS IS DOSSING YOUR PATCHING POLICY (AND WASTING YOUR MONEY)
HIDING @ DEPTH - EXPLORING, SUBVERTING AND BREAKING NAND FLASH MEMORY
MACTANS: INJECTING MALWARE INTO IOS DEVICES VIA MALICIOUS CHARGERS
TOWN HALL MEETING: CFAA REFORM STRATEGY
MALICIOUS FILE FOR EXPLOITING FORENSIC SOFTWARE