PDF/DOCX/ePub/Mobi Schedules

Visit Khan Fu for Mobile/iCal Schedules

Friday, January 13, 2017
Time One Track Mind
1200 Registration Opens

Opening Remarks, Rumblings, Ruminations, and Rants

U2F Zero: Secure Hardware Design, DIY Mass Production, and Amazon Prime

Conor Patrick

35 Years of Cyberwar: The Squirrels are Winning

Space Rogue

Implantable Logic Analyzers and Unlocking Doors

Kenny McElroy

Cyborg Self-Hacking: An Examination of Cochlear Implants

Jeff Dodge

Introducing Jak: Safely Share Sensitive Files via Git

Chris DiLorenzo

Can a Drunk Person Authenticate Using Brainwaves? #NotAlcoholicsJustResearchers

Tommy Chin and Peter Muller


Seven Things: Frank Zappa, T. Coraghassen Boyle, and Twenty-one Years in Security

Dr. Gary McGraw

Time Firetalks
How to Spoil all Movies and Give an Unforgettable Presentation

Jason Blanchard

Quick and Dirty Emulation of ARM Firmware

Travis Goodspeed

NAVRIE Athena — A graph database solution to unify InfoSec data and workflow

Peter Clemenko

22 Short Films About Security

Charlie Vedaa

Slash AppSec Costs, Free Threat Modeling & Compliance Data Output

John Willis

You Can Do the Thing!

Brendan O’Connor

Saturday, January 14, 2017
Time Build It! Belay It! Bring it On!
0930 Registration Opens
So You Want to Hack Radios

Marc Newlin and Matt Knight

LangSec for Penetration Testing: How and Why

Falcon Darkstar Momot and Sergey Bratus

A Widening Attack Plain: Threatcasting Tomorrow’s Threats

Brian David Johnson and Natalie Vanatta

Exploring The Infrared World

Dominic Spill and Michael Ossmann

Know Normal, Find Evil: Windows 10 Edition

Jake Williams

Ask the Feds

Allan Friedman, Nick Leiserson, Eric Mill, and Jessica Wilkerson

A Context-Aware Kernel IPC Firewall for Android

David Wu and Sergey Bratus

Who Wants to Allow Arbitrary Code Execution on Their Boxes? We Do It Every Day.

Brian Redbeard and Brad Ison

Ask the EFF: Protecting Tomorrow

Kurt Opsahl and Andrew Crocker

1300 Break
WaveConverter – An Open Source Software Tool for RF Reverse Engineering

Paul Clark

Goodnight Moon & the House of Horrors: A look at the current IoT ecosystem and the regulations trying to control it

Whitney Merrill and Aaron Alva

h·cek: Computing a Hacker Experience

Allison Miller, Melissa Clarke, and Margaret Schedel

I Have a Graph Database. Now What?

Nicolas Kseib and Shimon Modi

Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles

Rebekah Houser

Flailing is Learning: My First Year as a Malware Analyst

Lauren Pearce

0wn the Con

The Shmoo Group

Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment

Alexander Chailytko and Stanislav Skuratovich

The State of Secure Messaging

Nikita Borisov and Sze Chuen Tan

User Focused Security at Netflix: Stethoscope

Andrew White and Jesse Kriss

Anti-Ransomware: Turning the Tables

Gal Shpantzer and G. Mark Hardy

The Metadata is the Message (and Sometimes the Message is the Metadata

Matt Blaze

2100 Saturday Night Party

Sunday, January 15, 2017
Time Build It! Belay It! Bring it On!
0930 Registration Opens
ripr – Run Slices of Binary Code from Python

Patrick Biernat

Dig Out Your Brick Phone! Bringing AMPS Back with GNU Radio

Brandon Creighton

A Nickel Tour of the Ad Fraud Ecosystem

Ryan Castellucci

Safety Bot Guaranteed

Rich Seymour

Excuse me, Server, Do You Have the Time?

Brian Cardinale

The Threat Intel Results are in… You are NOT the hacker! : Disinformation Campaigns vs. Attribution Claims

Mark Kuhr

(In-)secure messaging with SCIMP and OMEMO

Sebastian Verschoor

Does a BEAR Leak in the Woods? The Democratic National Committee breach, Russian APTs, and the 2016 U.S. Election

Toni Gidwani

Challenges and Opportunities: Application Containers and Micro Services

Anil Karmel and Andrew Wild

Designing and Executing the Worldís First All-Computer Hacking Competition: A panel with the development team

Tim Vidas, Chris Eagle, Jason Wright, Brian Caswell, Mike Thompson, and Holt Sorenson


Closing Remarks