Friday, January 31, 2020 | |
---|---|
Time | One Track Mind |
1200 | Registration Opens |
1400 |
Opening Remarks, Rumblings, Ruminations, and Rants |
1530 | Moose v. Woodchuck
Samantha Livingston |
1600 | Reverse Engineering Apple’s BLE Continuity Protocol for Tracking, OS Fingerprinting, and Behavioral Profiling
Sam Teplov |
1630 | Think of the Kitten: The Truth About Section 230, the Law All the Cute Online Cat Pictures (And a Lot of Other Good Stuff) Depends On
Cathy Gellis |
1700 | Zoom 0-Day: How Not to Handle a Vulnerability Report
Jonathan Leitschuh |
1730 | What if We Had TLS for Phone Numbers? An Introduction to SHAKEN/STIR
Kelley Robinson |
1800 | Robots and Privacy
Brittany Postnikoff |
1845 | Registration Closes |
1900 |
Sunday, February 02, 2020 | |||
---|---|---|---|
Time | Build It! | Belay It! | Bring it On! |
0930 | Registration Opens | ||
1000 | A Wireless Journeyman’s Experience in Practical SIGINT
Russell Handorf |
Adversary Detection Pipelines: Finally Making Your Threat Intel Useful
Xena Olsen |
Crossing the Border With Your Electronic Devices
Kurt Opsahl and Bill Budington |
1100 | Knowing the UnFuzzed and Finding Bugs with Coverage Analysis
Mark Griffin |
Real World Zero Trust Implementation
Mark Loveless |
Playing the Short Game: The Effects of Data Breaches on Share Prices
Chaim Sanders |
1200 | The Verilog to Verilog Decompiler Katie Liszewski |
Project Everest: Fast, Correct, and Secure Software for Deployment Now!
Jonathan Protzenko and Nikhil Swamy |
Hack the Stars Yacko, Wacko, and Dot |
1300 | Between Two Moose Kiersten Todt, Matt Blaze, Beetle, and Bruce Potter (interviewer) |
||
1400 |
Closing Remarks |
||
1500 | End of Con – See You Next Year! |