USA
Europe
Asia
Regional Summits
Sao Paulo 2014
Archives
Sponsorships
Press
About
About Us
Community
Review Board
Training Review Board
Contact Us
Code of Conduct
Privacy
Schedule
Trainings
July 27-30
Briefings
July 31
Briefings
August 01
Arsenal
July 31
Arsenal
August 01
Executive Summit
July 30
Sponsored Workshops
July 31
Briefings | August 01
Download Briefing Schedule
Registration 0830 – 16:00
0800
Breakfast
Sponsored By
Sponsor Hall Hours: 10:00 – 17:00
0900
Keynote Speaker: Brian Muirhead
1000
Break
1015
CMX: IEEE Clean File
Metadata Exchange
Mark Kennedy
&
Igor Muttik
Roman 2
Mobile Malware: Why the
Traditional AV Paradigm is Doomed
Markus Jakobsson
&
Guy Stewart
Roman 2
Pass-the-Hash 2: The
Admin's Revenge
Skip Duckwall
&
Christopher Campbell
Roman 4
Abusing Web APIs Through
Scripted Android Applications
Daniel Peck
Roman 1 & 3
Big Data for Web
Application Security
Mike Arpaia
&
Kyle Barry
Roman 1 & 3
The SCADA That Didn't Cry
Wolf - Who's Really Attacking Your ICS Devices - Part Deux!
Kyle Wilhoit
Palace 2
KickaaS Defense with
Cloud and Software Defined Security
Rich Mogull
Palace 3
Fully Arbitrary 802.3
Packet Injection: Maximizing Ethernet Attack Surface
Andrea Barisani
&
Daniele Bianco
Augustus 5 & 6
Bluetooth Smart: The
Good, the Bad, the Ugly, and the Fix!
Mike Ryan
Palace 1
Honey, I'm Home!! -
Hacking Z-Wave Home Automation Systems
Behrang Fouladi
&
Sahand Ghanoun
Augustus 1 & 2
The Factoring Dead:
Preparing for Cyptopocalypse
Alex Stamos
&
Thomas Ptacek
&
Tom Ritter
&
Javed Samuel
Augustus 3 & 4
Mo' Malware, Mo'
Problems - Cuckoo Sandbox to the Rescue
Jurriaan Bremer
&
Claudio Guarnieri
&
Mark Schloesser
Pompeian
Do-It-Yourself Cellular
IDS
Sherri Davidoff
&
David Harrison
&
Scott Fretheim
Florentine
1115
Coffee Service
Sponsored By
1145
Bochspwn: Identifying 0-
Days via System-Wide Memory Access Pattern Analysis
Mateusz 'j00ru' Jurczyk
&
Gynvael Coldwind
Roman 2
Energy Fraud and
Orchestrated Blackouts: Issues with Wireless Metering Protocols (wM-Bus)
Cyrill Brunschwiler
Roman 4
Dissecting CSRF Attacks
and Countermeasures
Mike Shema
&
Sergey Shekyan
&
Vaagn Toukharian
Roman 1 & 3
Hunting the Shadows:
In-Depth Analysis of Escalated APT Attacks
Fyodor Yarochkin
&
Jeremy 'Birdman' Chiu
&
Tsung Pei Kan
&
Benson Wu
Palace 2
The Outer Limits: Hacking
The Samsung Smart TV
Aaron Grattafiori
&
Josh Yavor
Palace 3
Revealing Embedded
Fingerprints: Deriving Intelligence from USB Stack Interactions
Andy Davis
Augustus 5 & 6
UART THOU MAD?
Toby Kohlenberg
&
Mickey Shkatov
Palace 1
Android: One Root to
Own them All
Jeff Forristal
Augustus 1 & 2
Stepping p3wns:
Adventures in Full Spectrum Embedded Exploitation
Ang Cui
&
Michael Costello
&
Salvatore Stolfo
&
Jatin Kataria
Augustus 3 & 4
Do-It-Yourself Cellular
IDS
Sherri Davidoff
&
David Harrison
&
Scott Fretheim
Pompeian
Mo' Malware, Mo'
Problems - Cuckoo Sandbox to the Rescue cont
Jurriaan Bremer
&
Claudio Guarnieri
&
Mark Schloesser
Florentine
1245
Lunch
Sponsored By
1415
USING ONLINE ACTIVITY AS
DIGITAL FINGERPRINTS TO CREATE A BETTER SPEAR PHISHER
Joaquim Espinhara
&
Ulisses Albuquerque
Roman 2
Hot Knives Through
Butter: Bypassing Automated Analysis Systems
Abhishek Singh
&
Zheng Bu
Roman 4
Above My Pay Grade:
Cyber Response at the National Level
Jason Healey
Roman 1 & 3
') UNION SELECT `This_Talk`
AS ('New Optimization and Obfuscation Techniques’)%00
Roberto Salgado
Palace 2
Out of Control:
Demonstrating SCADA Device Exploitation
Eric Forner
&
Brian Meixell
Palace 3
Funderbolt: Adventures
in Thunderbolt DMA Attacks
Russ Sevinsky
Augustus 5 & 6
Press ROOT to Continue:
Detecting OSX and Windows Bootkits with RDFU
Mario Vuksan
&
Tomislav Pericin
Palace 1
What's on the Wire?
- Physical Layer Tapping with Project Daisho
Dominic Spill
&
Michael Ossmann
&
Michael 'Dragorn' Kershaw
Augustus 1 & 2
Implantable Medical
Devices: Hacking Humans
Barnaby Jack
Augustus 3 & 4
Mobile Forensics Sudden
Death Workshop
Scott Fretheim
&
Jonathan Neff
Pompeian
JTAGulator: Assisted
Discovery of On-Chip Debug Interfaces
Joe Grand
Florentine
1515
Break
1530
CreepyDOL: Cheap,
Distributed Stalking
Brendan O'Connor
Roman 2
Post Eploitation
Operations with Cloud Synchronization
Jacob Williams
Roman 4
Virtual Deobfuscator - A
DARPA Cyber Fast Track Funded Effort
Jason Raber
Roman 1 & 3
Is that a Government in
Your Network or are you Just Happy to See Me?
Eric Fiterman
Palace 2
Compromising Industrial
Facilities from 40 Miles Away
Lucas Apa
Palace 3
RFID Hacking: Live Free or
RFID Hard
Fran Brown
Augustus 5 & 6
SSL, Gone in 30 Seconds - A
BREACH beyond CRIME
Angelo Prado
&
Neal Harris
&
Yoel Gluck
Palace 1
Exploiting Network
Surveillance Cameras Like a Hollywood Hacker
Craig Heffner
Augustus 1 & 2
HACKING, SURVEILLING, AND
DECEIVING VICTIMS ON SMART TV
SeungJin 'Beist' Lee
Augustus 3 & 4
Mobile Forensics Sudden
Death Workshop cont
Scott Fretheim
&
Jonathan Neff
Pompeian
JTAGulator: Assisted
Discovery of On-Chip Debug Interfaces cont
Joe Grand
Florentine
1630
Coffee Service
Sponsored By
1700
OptiROP: hunting for
ROP gadgets in style
Nguyen Anh Quynh
Roman 2
Defending Networks With
Incomplete Information: A Machine Learning Approach
Alexandre Pinto
Roman 4
Teridian SoC Exploitation:
Exploration of Harvard Architecture Smart Grid Systems
Josh 'm0nk' Thomas
&
Nathan Keltner
Roman 1 & 3
Bugalyze.com - Detecting
bugs using decompilation and data flow analysis
Silvio Cesare
Palace 2
Hacking Like in the Movies:
Visualizing Page Tables for Local Exploitation
Georg '0xff' Wicherski
&
Alexandru Radocea
&
Alex Ionescu
Palace 3
Home Invasion v2.0 -
Attacking Network-Controlled Hardware
Daniel Crowley
&
David Bryan
&
Jennifer Savage
Augustus 5 & 6
Multiplexed Wired Attack
Surfaces
Michael Ossmann
&
Kyle 'Kos' Osborn
Palace 1
Owning the Routing Table
- Part II
Gabi Nakibly
Augustus 1 & 2
Spy-jacking the Booters
Brian Krebs
&
Lance James
Augustus 3 & 4