USA
Europe
Asia
Trainings
Archives
Sponsorships
Press
About
About Us
Community
Review Board
Training Review Board
Contact Us
Code of Conduct
Privacy
Upcoming Events
Media Registration
Briefings Abstracts
Arsenal Lineup
Arsenal Overview
Event Sponsors
Sponsor News
Executive Summit
Call for Papers
Call for Tools
All
A-E
F-J
K-O
P-T
U-Z
All Sessions
Speakers
Format(s)
Select All
|
Clear
25-Minute Briefings
50-Minute Briefings
Track(s)
Select All
|
Clear
Applied Security
Cryptography
Data Forensics/Incident Response
Enterprise
Exploit Development
Hardware/Embedded
Human Factors
Internet of Things
Malware
Mobile
Network Defense
Platform Security
Policy
Reverse Engineering
Smart Grid/Industrial Security
Web AppSec
Session Type(s)
Select All
|
Clear
Briefings
No sessions found
Unscheduled
Attacking NextGen Roaming Networks
Location:
TBD
Speaker:
Daniel Mende
,
Hendrik Schmidt
Tracks
:
Mobile,
Network Defense
Format
: 50-Minute Briefings
Attacks Against GSMA's M2M Remote Provisioning
Location:
TBD
Speaker:
Maxime Meyer
Tracks
:
Mobile,
Applied Security
Format
: 25-Minute Briefings
A Universal Controller to Take Over a Z-Wave Network
Location:
TBD
Speaker:
Loïc Rouch
Tracks
:
Internet of Things,
Exploit Development
Format
: 25-Minute Briefings
Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing
Location:
TBD
Speaker:
Antti Levomäki
,
Olli-Pekka Niemi
Track
:
Network Defense
Format
: 50-Minute Briefings
BlueBorne - A New Class of Airborne Attacks that can Remotely Compromise Any Linux/IoT Device
Location:
TBD
Speaker:
Ben Seri
,
Gregory Vishnepolsky
Tracks
:
Exploit Development,
Internet of Things
Format
: 50-Minute Briefings
Breaking Bad: Stealing Patient Data Through Medical Devices
Location:
TBD
Speaker:
Saurabh Harit
Tracks
:
Internet of Things,
Hardware/Embedded
Format
: 50-Minute Briefings
Breaking Out HSTS (and HPKP) on Firefox, IE/Edge and (Possibly) Chrome
Location:
TBD
Speaker:
Sergio De Los Santos
,
Sheila Berta
Tracks
:
Web AppSec,
Network Defense
Format
: 50-Minute Briefings
By-design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms
Location:
TBD
Speaker:
Arnaud Bannier
,
Eric Filiol
Tracks
:
Cryptography,
Applied Security
Format
: 50-Minute Briefings
CALDERA: Automating Adversary Emulation
Location:
TBD
Speaker:
Andy Applebaum
,
Douglas Miller
Tracks
:
Network Defense,
Applied Security
Format
: 50-Minute Briefings
CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management
Location:
TBD
Speaker:
Adrian Tang
,
Salvatore Stolfo
,
Simha Sethumadhavan
Tracks
:
Platform Security,
Applied Security
Format
: 50-Minute Briefings
Dealing the Perfect Hand - Shuffling Memory Blocks on z/OS
Location:
TBD
Speaker:
Ayoub Elaassal
Tracks
:
Applied Security,
Platform Security
Format
: 50-Minute Briefings
DIFUZZing Android Kernel Drivers
Location:
TBD
Speaker:
Aravind Machiry
,
Chris Salls
,
Jake Corina
,
Shuang Hao
,
Yan Shoshitaishvili
Tracks
:
Mobile,
Hardware/Embedded
Format
: 50-Minute Briefings
Enraptured Minds: Strategic Gaming of Cognitive Mindhacks
Location:
TBD
Speaker:
Fyodor Yarochkin
,
Lion Gu
,
Vladimir Kropotov
Tracks
:
Human Factors,
Enterprise
Format
: 50-Minute Briefings
Exfiltrating Reconnaissance Data from Air-Gapped ICS/SCADA Networks
Location:
TBD
Speaker:
David Atch
Tracks
:
Smart Grid/Industrial Security,
Internet of Things
Format
: 50-Minute Briefings
Fed Up Getting Shattered and Log Jammed? A New Generation of Crypto is Coming
Location:
TBD
Speaker:
David Wong
Track
:
Cryptography
Format
: 50-Minute Briefings
GDPR and Third Party JS - Can it be Done?
Location:
TBD
Speaker:
Avital Grushcovski
Tracks
:
Policy,
Enterprise
Format
: 25-Minute Briefings
Heap Layout Optimisation for Exploitation
Location:
TBD
Speaker:
Sean Heelan
Tracks
:
Exploit Development,
Applied Security
Format
: 50-Minute Briefings
Hiding Pin's Artifacts to Defeat Evasive Malware
Location:
TBD
Speaker:
Andrea Continella
,
Fabio Gritti
,
Lorenzo Fontana
,
Mario Polino
,
Sebastiano Mariani
,
Stefano D'Alessio
,
Stefano Zanero
Tracks
:
Malware,
Reverse Engineering
Format
: 50-Minute Briefings
How Samsung Secures Your Wallet and How to Break It
Location:
TBD
Speaker:
HC MA
Tracks
:
Mobile,
Applied Security
Format
: 50-Minute Briefings
How to Hack a Turned-Off Computer, or Running Unsigned Code in Intel Management Engine
Location:
TBD
Speaker:
Mark Ermolov
,
Maxim Goryachy
Tracks
:
Platform Security,
Hardware/Embedded
Format
: 50-Minute Briefings
How to Rob a Bank Over the Phone - Lessons Learned and Real Audio from an Actual Social Engineering Engagement
Location:
TBD
Speaker:
Joshua Crumbaugh
Track
:
Human Factors
Format
: 50-Minute Briefings
Intel ME: Flash File System Explained
Location:
TBD
Speaker:
Dmitry Sklyarov
Tracks
:
Reverse Engineering,
Platform Security
Format
: 50-Minute Briefings
I Trust My Zombies: A Trust-Enabled Botnet
Location:
TBD
Speaker:
Emmanouil Vasilomanolakis
,
Jan Helge Wolf
,
Leon Böck
,
Max Mühlhäuser
,
Shankar Karuppayah
Tracks
:
Malware,
Network Defense
Format
: 25-Minute Briefings
Key Reinstallation Attacks: Breaking the WPA2 Protocol
Location:
TBD
Speaker:
Mathy Vanhoef
Tracks
:
Cryptography,
Network Defense
Format
: 50-Minute Briefings
Nation-State Moneymule's Hunting Season – APT Attacks Targeting Financial Institutions
Location:
TBD
Speaker:
Chi-en (Ashley) Shen
,
Kyoung-ju Kwak
,
Min-Chang Jang
Tracks
:
Data Forensics/Incident Response,
Malware
Format
: 50-Minute Briefings
Red Team Techniques for Evading, Bypassing, and Disabling MS Advanced Threat Protection and Advanced Threat Analytics
Location:
TBD
Speaker:
Chris Thompson
Tracks
:
Enterprise,
Applied Security
Format
: 50-Minute Briefings
The Apple of Your EFI: An Updated Analysis of the State of Apple's EFI Security Support
Location:
TBD
Speaker:
Pepijn Bruienne
,
Rich Smith
Tracks
:
Hardware/Embedded,
Platform Security
Format
: 50-Minute Briefings
The Spear to Break the Security Wall of S7CommPlus
Location:
TBD
Speaker:
Lei Cheng
Tracks
:
Smart Grid/Industrial Security,
Applied Security
Format
: 25-Minute Briefings
Wi-Fi Direct to Hell: Attacking Wi-Fi Direct Protocol Implementations
Location:
TBD
Speaker:
Andrés Blanco
Tracks
:
Applied Security,
Network Defense
Format
: 50-Minute Briefings
Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits
Location:
TBD
Speaker:
Lillian Ablon
Tracks
:
Policy,
Exploit Development
Format
: 50-Minute Briefings