USA
Europe
Asia
Trainings
Archives
Sponsorships
Press
About
About Us
Community
Review Board
Training Review Board
Contact Us
Code of Conduct
Privacy
Upcoming Events
i
Media Registration
Briefings Abstracts
Arsenal Overview
Arsenal Lineup
Exhibit Now
Event Sponsors
Sponsor Portal
Business Hall
Business Hall Presentations
Dark Reading Presentations
Trainings
November 1 & 2
Briefings
November 3
Arsenal
November 3
Business Hall Presentations
November 3
Briefings
November 4
Arsenal
November 4
Business Hall Presentations
November 4
Briefings Schedule | November 3
10:00
Automating Incident Response: Sit Back and Relax, Bots are Taking Over…
Elvis Hovor
&
Mohamed El-Sharkawi
Room A
10:00 - 11:00
Flip Feng Shui: Rowhammering the VM's Isolation
Kaveh Razavi
&
Ben Gras
&
Erik Bosman
&
Bart Preneel
&
Cristiano Giuffrida
&
Herbert Bos
Auditorium
10:00 - 11:00
Pocket-Sized Badness: Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game
Federico Maggi
&
Stefano Zanero
Room DEFG
10:00 - 11:00
WiFi-Based IMSI Catcher
Piers O'Hanlon
&
Ravishankar Borgaonkar
Gallery Hall
10:00 - 11:00
11:15
50 Thousand Needles in 5 Million Haystacks: Understanding Old Malware Tricks to Find New Malware Families
Veronica Valeros
&
Karel Bartos
&
Lukas Machlica
Gallery Hall
11:15 - 12:15
Code Deobfuscation: Intertwining Dynamic, Static and Symbolic Approaches
Robin David
&
Sébastien Bardin
Room DEFG
11:15 - 12:15
Effective File Format Fuzzing – Thoughts, Techniques and Results
Mateusz Jurczyk
Room A
11:15 - 12:15
Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit
Ali Abbasi
&
Majid Hashemi
Auditorium
11:15 - 12:15
12:30
Chasing Foxes by the Numbers: Patterns of Life and Activity in Hacker Forums
Christopher Ahlberg
Room A
12:30 - 13:00
How to Fool an ADC, Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing
Alexander Bolshev
&
Gabriel Gonzalez
Room DEFG
12:30 - 13:30
I Know What You Saw Last Minute - The Chrome Browser Case
Ran Dubin
Auditorium
12:30 - 13:00
Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks
Max Bazaliy
&
Seth Hardy
&
Andrew Blaich
Gallery Hall
12:30 - 13:30
14:30
Another Brick Off the Wall: Deconstructing Web Application Firewalls Using Automata Learning
George Argyros
&
Ioannis Stais
Auditorium
14:30 - 15:30
Narcos, Counterfeiters and Scammers: An Approach to Visualize Illegal Markets
Andrew Lewman
&
Stevan Keraudy
Room DEFG
14:30 - 15:30
Rooting EVERY Android: From Extension to Exploitation
Di Shen
&
Jiahong (James) Fang
Gallery Hall
14:30 - 15:30
Towards a Policy-Agnostic Control-Flow Integrity Implementation
Dean Sullivan
&
Orlando Arias
&
Yier Jin
&
Ahmad-Reza Sadeghi
Room A
14:30 - 15:30
16:00
Attacking Windows by Windows
Yin Liang
&
Li Zhou
Gallery Hall
16:00 - 17:00
Cyber Judo: Offensive Cyber Defense
Tal Be'ery
&
Itai Grady
Auditorium
16:00 - 17:00
Stumping the Mobile Chipset
Adam Donenfeld
Room A
16:00 - 17:00
Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking
Vasilios Mavroudis
&
Shuang Hao
&
Yanick Fratantonio
&
Federico Maggi
&
Giovanni Vigna
&
Christopher Kruegel
Room DEFG
16:00 - 17:00