USA 2017: MAY 10 SELECTIONS - 30 NEW BRIEFINGS ANNOUNCED
As our Review Board members continue to work their way through a record number of submissions, we are releasing new selections in batches. Below are the most recently announced Briefings, with links to their abstracts.
For a complete list of ALL Briefings selected to date, and to search by specific tracks, click here.
- Adventures in Attacking Wind Farm Control Networks
by Jason Staggs
- An ACE Up the Sleeve: Designing Active Directory DACL Backdoors
by Andy Robbins, Will Schroeder
- Attacking Encrypted USB Keys the Hard(ware) Way
by Jean-Michel Picod, Audebert, Elie Bursztein
- Betraying the BIOS: Where the Guardians of the BIOS are Failing
by Alex Matrosov
- Bug Collisions Meet Government Vulnerability Disclosure
by Trey Herr, Lillian Ablon, Jason Healey, Bruce Schneier, Kim Zetter
- CFP: Splunking Dark Tools - A Pentesters Guide to Pwnage Visualization
by Nathan Bates, Bryce Kunz
- Escalating Insider Threats Using VMware's API
by Ofri Ziv
- Evading Microsoft ATA for Active Directory Domination
by Nikhil Mittal
- Evil Bubbles or How to Deliver Attack Payload via the Physics of the Process
by Marina Krotofil
- Evilsploit - A Universal Hardware Hacking Toolkit
by Chui Yew Leong, Mingming Wan
- Fighting Targeted Malware in the Mobile Ecosystem
by Megan Ruthven, Andrew Blaich
- Fractured Backbone: Breaking Modern OS Defenses with Firmware Attacks
by Yuriy Bulygin, Oleksandr Bazhaniuk, Andrew Furtak, Mikhail Gorobets
- Hacking Hardware with a $10 SD Card Reader
by Amir Etemadieh, CJ Heres, Khoa Hoang
- Hunting GPS Jammers
by Vlad Gostomelsky
- Ichthyology: Phishing as a Science
by Karla Burnett
- Intel AMT Stealth Breakthrough
by Dmitriy Evdokimov, Alexander Ermolov, Maksim Malyutin
- kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse
by Marios Pomonis
- Orange is the New Purple - How and Why to Integrate Development Teams with Red/Blue Teams to Build More Secure Software
by April Wright
- Practical Tips for Defending Web Applications in the Age of DevOps
by Zane Lackey
- Protecting Pentests: Recommendations for Performing More Secure Tests
by Wesley McGrew
- rVMI: A New Paradigm for Full System Analysis
by Jonas Pfoh, Sebastian Vogl
- ShieldFS: The Last Word in Ransomware Resilient File Systems
by Andrea Continella, Alessandro Barenghi, Giulio De Pasquale, Alessandro Guagnelli, Federico Maggi, Stefano Zanero, Giovanni Zingaro
- So You Want to Market Your Security Product...
by Aaron Alva, Terrell McSweeny
- Sonic Gun to Smart Devices: Your Devices Lose Control Under Ultrasound/Sound
by Zhengbo Wang, Wang Kang, Aimin Pan
- Taking DMA Attacks to the Next Level: How to do Arbitrary Memory Reads/Writes in a Live and Unmodified System Using a Rogue Memory Controller
by Anna Trikalinou, Dan Lake
- The Industrial Revolution of Lateral Movement
by Tal Be'ery
- They're Coming for Your Tools: Exploiting Design Flaws for Active Intrusion Prevention
by John Ventura
- What They're Teaching Kids These Days: Comparing Security Curriculums and Accreditations to Industry Needs
by Chaim Sanders, Rob Olson
- White Hat Privilege: The Legal Landscape for a Cybersecurity Professional Seeking to Safeguard Sensitive Client Data
by Karen Neuman, Jacob Osborn
- WSUSpendu: How to Hang WSUS Clients
by Romain Coltel, Yves Le Provost