09:00 |
Tabriz
|
Optimistic Dissatisfaction with the Status Quo: Steps We Must Take to Improve Security in Complex Landscapes |
10:30 |
Tomasello
|
Holding on for Tonight: Addiction in InfoSec |
Goland,
Naor
|
Dissecting Non-Malicious Artifacts: One IP at a Time |
|
Marcil
|
Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking |
|
Ducau,
Harang
|
Measuring the Speed of the Red Queen's Race; Adaption and Evasion in Malware |
|
Malmquist
|
Exposing the Bait: A Qualitative Look at the Impact of Autonomous Peer Communication to Enhance Organizational Phishing Detection |
|
Bengtson
|
Detecting Credential Compromise in AWS |
|
Volokitin
|
Software Attacks on Hardware Wallets |
|
Rousseau,
Seymour
|
Finding Xori: Malware Analysis Triage with Automated Disassembly |
|
Friedman
|
How I Learned to Stop Worrying and Love the SBOM |
|
11:15 |
Dykstra,
Paul
|
Stress and Hacking: Understanding Cognitive Stress in Tactical Cyber Ops |
Groß
|
New Trends in Browser Exploitation: Attacking Client-Side JIT Compilers |
|
Chen
|
KeenLab iOS Jailbreak Internals: Userland Read-Only Memory can be Dangerous |
|
Desclaux,
Mougey
|
Miasm: Reverse Engineering Framework |
|
Everette,
Postnikoff,
Terp
|
From Bot to Robot: How Abilities and Law Change with Physicality |
|
Bialek,
Joly
|
A Dive in to Hyper-V Architecture & Vulnerabilities |
|
Saxe
|
Deep Neural Networks for Hackers: Methods Applications and Open Source Tools |
|
Little
|
Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths |
|
Carcano,
Dragoni,
Krotofil
|
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems Forever |
|
13:30 |
Bailey,
Bender,
Elazari,
Granick,
Menn,
Rosen
|
Legal Landmines: How Law and Policy are Rapidly Shaping Information Security |
Milburn,
Pellicer,
Timmers,
Veredas,
Wiersma,
Witteman
|
There will be Glitches: Extracting and Analyzing Automotive Firmware Efficiently |
|
Tam
|
No Royal Road … Notes on Dangerous Game |
|
Nafeez
|
Compression Oracle Attacks on VPN Networks |
|
Valadon
|
Reversing a Japanese Wireless SD Card - From Zero to Code Execution |
|
Bazhaniuk,
Michael,
Shkatov
|
Remotely Attacking System Firmware |
|
Camurati,
Francillon,
Hayes,
Muench,
Poeplau
|
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers |
|
Camredon,
Lenoir
|
Deep Dive into an ICS Firewall Looking for the Fire Hole |
|
Gordeychik,
Timorin
|
Too Soft\[ware Defined\] Networks: SD-WAN Vulnerability Assessment |
|
14:40 |
Shostack
|
Threat Modeling in 2018: Attacks Impacts and Other Updates |
Dameff,
Radcliffe
|
Mental Health Hacks: Fighting Burnout Depression and Suicide in the Hacker Community |
|
Anise,
Wright
|
Don't @ Me: Hunting Twitter Bots at Scale |
|
Donenfeld
|
WireGuard: Next Generation Secure Network Tunnel |
|
Christensen,
Graeber
|
Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology |
|
Gruss,
Lipp,
Schwarz
|
Meltdown: Basics Details Consequences |
|
Metcalf
|
From Workstation to Domain Admin: Why Secure Administration isn't Secure and How to Fix it |
|
Wixey
|
Every ROSE has its Thorn: The Dark Art of Remote Online Social Engineering |
|
Soler,
Waisman
|
The Unbearable Lightness of BMC's |
|
16:00 |
Be'ery,
Marcovich,
Ron,
Shulman
|
Open Sesame: Picking Locks with Cortana |
Borgaonkar,
Shaik
|
LTE Network Automation Under Threat |
|
Mulasmajic,
Peterson
|
Why so Spurious? How a Highly Error-Prone x86/x64 CPU Feature can be Abused to Achieve Local Privilege Escalation on Many Operating Systems |
|
Beer
|
A Brief History of Mitigation: The Path to EL1 in iOS 11 |
|
Tsai
|
Breaking Parser Logic: Take Your Path Normalization off and Pop 0days Out! |
|
Doerr,
Linton,
Manion,
Robinson
|
Behind the Speculative Curtain: The True Story of Fighting Meltdown and Spectre |
|
Roth
|
Breaking the IIoT: Hacking industrial Control Gateways |
|
Weston
|
ZEROing Trust: Do Zero Trust Approaches Deliver Real Security? |
|
Valsorda
|
Squeezing a Key through a Carry Bit |
|
17:05 |
Munro
|
InfoSec Philosophies for the Corrupt Economy |
Heilman,
Narula
|
A Tangled Curl: Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme |
|
Li
|
AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries |
|
O'flynn
|
I for One Welcome Our New Power Analysis Overlords |
|
Kashyap,
Singh
|
Back to the Future: A Radical Insecure Design of KVM on ARM |
|
Guri
|
The Air-Gap Jumpers |
|
Lusthaus
|
Is the Mafia Taking Over Cybercrime? |
|
Perlow
|
Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure |
|
Peterson
|
How can Communities Move Forward After Incidents of Sexual Harassment or Assault? |
09:00 |
Gadsby
|
Stop that Release There's a Vulnerability! |
Schuermann
|
Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines |
|
Silvanovich
|
The Problems and Promise of WebAssembly |
|
Schranz
|
ARTist - A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware |
|
Hart
|
Real Eyes Realize Real Lies: Beating Deception Technologies |
|
Camp,
Das,
Russo
|
Two-Factor Authentication Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key |
|
Slowik
|
Demystifying PTSD in the Cybersecurity Environment |
|
Wardle
|
Fire & Ice: Making and Breaking macOS Firewalls |
|
Gollnick,
Smyth
|
Money-rity Report: Using Intelligence to Predict the Next Payment Card Fraud Victims |
|
09:45 |
Kononovich,
Stennikov
|
Black Box is Dead. Long Live Black Box! |
Holtz
|
The Science of Hiring and Retaining Female Cybersecurity Engineers |
|
Lewis,
Lute,
Moss,
Painter
|
New Norms and Policies in Cyber-Diplomacy |
|
Aqil,
Seymour
|
Your Voice is My Passport |
|
Shattuck
|
Snooping on Cellular Gateways and Their Critical Role in ICS |
|
Ludwig
|
Identity Theft: Attacks on SSO Systems |
|
Desimone,
Landau
|
Kernel Mode Threats and Practical Defenses |
|
Ionescu,
Viala
|
The Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet |
|
Kobayashi,
Suzuki
|
Reconstruct the World from Vanished Shadow: Recovering Deleted VSS Snapshots |
|
11:00 |
Geesaman
|
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform Capabilities |
Guilfanov
|
Decompiler Internals: Microcode |
|
Blaich,
Flossman
|
Stealth Mango and the Prevalence of Mobile Surveillanceware |
|
Bélanger,
Endahl
|
A Deep Dive into macOS MDM (and How it can be Compromised) |
|
Dresen,
Müller
|
Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels |
|
Domas
|
GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs |
|
Marty
|
AI & ML in Cyber Security - Why Algorithms are Dangerous |
|
Hernandez
|
Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies |
|
Bland,
Dameff,
Tully
|
Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives |
|
12:10 |
Crowley,
Paredes,
Savage
|
Outsmarting the Smart City |
Engler,
Lukasiewicz
|
WebAssembly: A New World of Native Exploits on the Browser |
|
Alguacil,
Moya
|
Playback: A TLS 1.3 Story |
|
Gras
|
TLBleed: When Protecting Your CPU Caches is Not Enough |
|
Ertl,
Fogh,
Miller
|
Wrangling with the Ghost: An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities |
|
Delpy,
Toux
|
So I became a Domain Controller |
|
Miller,
Valasek
|
Applied Self-Driving Car Security |
|
Parikh,
Stewart,
Treit
|
Protecting the Protector Hardening Machine Learning Defenses Against Adversarial Attacks |
|
Hui,
Kang
|
None of My Pixel is Your Business: Active Watermarking Cancellation Against Video Streaming Service |
|
14:30 |
Bulazel
|
Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator |
Su,
Wu,
Xing
|
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities |
|
Haken
|
Automated Discovery of Deserialization Gadget Chains |
|
Gruss,
Lipp,
Schwarz
|
Another Flip in the Row |
|
Palansky
|
Legal Liability for IOT Cybersecurity Vulnerabilities |
|
Carlsson,
Harris
|
Catch me Yes we can! – Pwning Social Engineers using Natural Language Processing Techniques in Real-Time |
|
Grassi,
Liu,
Xie
|
Exploitation of a Modern Smartphone Baseband |
|
Santamarta
|
Last Call for SATCOM Security |
|
Greenhagen,
Hurt,
Thayer
|
How can Someone with Autism Specifically Enhance the Cyber Security Workforce? |
|
15:50 |
Galloway,
Yunusov
|
For the Love of Money: Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems |
Lipner
|
SDL That Won't Break the Bank |
|
Rikansrud
|
Mainframe \[z/OS\] Reverse Engineering and Exploit Development |
|
Rabet
|
Hardening Hyper-V through Offensive Security Research |
|
Ege,
Woudenberg
|
Lowering the Bar: Deep Learning for Side Channel Analysis |
|
Costin,
Zaddach
|
IoT Malware: Comprehensive Survey Analysis Framework and Case Studies |
|
Butts,
Rios
|
Understanding and Exploiting Implanted Medical Devices |
|
Kettle
|
Practical Web Cache Poisoning: Redefining 'Unexploitable' |
|
Seeber
|
SirenJack: Cracking a 'Secure' Emergency Warning Siren System |
|
17:00 |
Kim,
Lee,
Shin,
Woo
|
The Finest Penetration Testing Framework for Software-Defined Networks |
Maier,
Shastry,
Ulitzsch
|
Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina |
|
Stone
|
Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library |
|
Stump,
Wyler
|
Lessons and Lulz: The 4th Annual Black Hat USA NOC Report |
|
Thomas
|
It's a PHP Unserialization Vulnerability Jim but Not as We Know It |
|
Mcgrew
|
An Attacker Looks at Docker: Approaching Multi-Container Applications |
|
Jang,
Kirat,
Stoecklin
|
DeepLocker - Concealing Targeted Attacks with AI Locksmithing |
|
Du,
Liu,
Nie,
Zhang
|
Over-the-Air: How we Remotely Compromised the Gateway BCM and Autopilot ECUs of Tesla Cars |
|
Böck,
Young
|
Return of Bleichenbacher's Oracle Threat (ROBOT) |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.