The Lifecycle of a Revolution
Server-Side Template Injection: RCE for the Modern Web App
How to Hack Government: Technologists as Policy Makers
Internet Plumbing for Security Professionals: The State of BGP Security
Writing Bad @$$ Malware for OS X
Android Security State of the Union
Bring Back the Honeypots
Why Security Data Science Matters and How Its Different: Pitfalls and Promises of Data Science Based Breach Detection and Threat Intelligence
Spread Spectrum Satcom Hacking: Attacking the GlobalStar Simplex Data Service
Unicorn: Next Generation CPU Emulator Framework
Emanate Like a Boss: Generalized Covert Data Exfiltration with Funtenna
Breaking HTTPS with BGP Hijacking
Attacking Interoperability - An OLE Edition
Defeating Pass-the-Hash: Separation of Powers
Winning the Online Banking War
Take a Hacker to Work Day - How Federal Prosecutors Use the CFAA
The Battle for Free Speech on the Internet
Understanding and Managing Entropy Usage
Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Adventures in Femtoland: 350 Yuan for Invaluable Fun
Red vs Blue: Modern Active Directory Attacks Detection and Protection
GameOver Zeus: Badguys and Backends
SMBv2: Sharing More than Just Your Files
Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorers Isolated Heap and MemoryProtection
The Tactical Application Security Program: Getting Stuff Done
These are Not Your Grand Daddys CPU Performance Counters - CPU Hardware Performance Counters for Security
Targeted Takedowns: Minimizing Collateral Damage Using Passive DNS
WSUSpect - Compromising the Windows Enterprise via Windows Update
Stagefright: Scary Code in the Heart of Android
Remote Exploitation of an Unaltered Passenger Vehicle
Big Game Hunting: The Peculiarities of Nation-State Malware Research
Back Doors and Front Doors Breaking the Unbreakable System
Switches Get Stitches
Distributing the Reconstruction of High-Level Intermediate Representation for Large Scale Malware Analysis
Stranger Danger! What is the Risk from 3rd Party Libraries?
The Little Pump Gauge that Could: Attacks Against Gas Pump Monitoring Systems
Faux Disk Encryption: Realities of Secure Storage on Mobile Devices
Optimized Fuzzing IOKit in iOS
Abusing Windows Management Instrumentation (WMI) to Build a Persistent Asynchronous and Fileless Backdoor
Attacking Hypervisors Using Firmware and Hardware
Crash & Pay: How to Own and Clone Contactless Payment Devices
Securing Your Big Data Environment
Panel: Getting It Right: Straight Talk on Threat & Information Sharing
Behind the Mask: The Agenda Tricks and Tactics of the Federal Trade Commission as they Regulate Cybersecurity
The Nodejs Highway: Attacks are at Full Throttle
Subverting Satellite Receivers for Botnet and Profit
Graphic Content Ahead: Towards Automated Scalable Analysis of Graphical Images Embedded in Malware
Cloning 3G/4G SIM Cards with a PC and an Oscilloscope: Lessons Learned in Physical Security
Commercial Mobile Spyware - Detecting the Undetectable
How Vulnerable are We to Scams?
Attacking ECMAScript Engines with Redefinition
Mobile Point of Scam: Attacking the Square Reader
THIS IS DeepERENT: Tracking App Behaviors with (Nothing Changed) Phone for Evasive Android Malware