This information is also available at Khan Fu.

Friday, January 18, 2019
Time One Track Mind
1200 Registration Opens
1400

Opening Remarks, Rumblings, Ruminations, and Rants

1530
Incident Response and the Attorney Client Privilege

Wendy Knox Everette

1600
Ad-Laundering: Bribes & Backdoors

John Amirrezvani

1630
Machine Learning Models that Predict Mental Health Status on Twitter and Their Privacy Implications

Janith Weerasingh and Rachel Greenstadt

1700
How the Press Gets Pwned

David Huerta

1730
Kinder Garten Security: Teaching the Pre-college Crowd

Sandra Gorka and Jacob Miller

1800
It’s 2019 and Special Agent Johnny Still Can’t Encrypt

Matt Blaze

Time Firetalks
1900

Firetalks Opening

1910
Shut up and Listen

Kirsten Renner

1930
Specialists versus Jack-Of-All-Trades

Nicole Schwartz

1950
Équipe Rouge: The Ethics of Prosecuting An Offensive Security Campaign

Tarah Wheeler and Roy Iversen

2010
Weapons of Text Destruction

Jared Stroud

2030
Infosec and 9-1-1: When the Location of Your Emergency is in the Building

Christine Giglio

2050
Whats the latest 411 on 419s?

Ray [Redacted]

2110

Firetalks Closing

Saturday, January 19, 2019
Time Build It! Belay It! Bring it On!
0930 Registration Opens
1000
Writing a Fuzzer for Any Language with American Fuzzy Lop

Ariel Zelivansky


High Confidence Malware Attribution using the Rich Header

Kevin Bilzer, RJ Joyce, and Seamus Burke


The Beginner’s Guide to the Musical Scales of Cyberwar

Jessica ‘Zhanna’ Malekos Smith

1100
CryptoLocker Deep-Dive: Tracking security threats on the Bitcoin public ledger

Olivia Thet and Nicolas Kseib


BECs and Beyond: Investigating and Defending Office 365

Douglas Bienstock


The APT at Home: The attacker that knows your mother’s maiden name

Chris Cox

1200
Process Control Through Counterfeit Comms: Using and Abusing Built-In Functionality to Own a PLC

Jared Rittle


Five-sigma Network Events (and how to find them)

John O’Neil


Firemen vs. Safety Matches: How the current skills pipeline is wrong

Amélie Koran

1300 Break
1400
Be an IoT Safety Hero: Policing Unsafe IoT through the Consumer Product Safety Commission

Andrea Matwyshyn and Elliot Kaye


Electronic Voting in 2018: Bad or Worse?

Matt Blaze


Ground Truth: 18 vendors, 6000 firmware images, 2.7 million binaries, and a flaw in the Linux/MIPS stack

Parker Thompson, Mudge, and Tim Carstens

1500
Trip Wire(less)

Omaha


Analyzing Shodan Images With Optical Character Recognition

Michael Portera


Advancing a Scientific Approach to Security Tool Evaluations with MITRE ATT&CK™

Francis Duff

1530
Social Network Analysis: A scary primer

Andrew Wong and Phil Vachon


Security Response Survival Skills

Ben Ridgway


Mentoring the Intelligent Deviant: What the special operations and infosec communities can learn from each other

Nina Kollars and Paul Brister

1600
Three Ways DuckDuckGo Protects User Privacy While Getting Things Done (and how you can too)

Marc Soda


iPhone Surgery for the Practically Paranoid

Evan Jensen and Rudy Cuevas


A Little Birdy Told Me About Your Warrants

Avi Zajac

1630
Post-quantum Crypto: Today’s defense against tomorrow’s quantum hacker

Christian Paquin


A Code Pirate’s Cutlass: Recovering Software Architecture from Embedded Binaries

evm


A Tisket, a Tasket, a Dark Web Shopping Basket

Emma Zaballos and Anne Addison Meriwether

1700
24/7 CTI: Operationalizing Cyber Threat Intelligence

Xena Olsen


0wn the Con

The Shmoo Group


Behind Enemy Lines: Inside the operations of a nation state’s cyber program

Andrew Blaich and Michael Flossman

2100 Saturday Night Party

Sunday, January 20, 2019
Time Build It! Belay It! Bring it On!
0930 Registration Opens
1000
Building and Selling Solo, an Open Source Secure Hardware Token

Conor Patrick


Looking for Malicious Hardware Implants with Minimal Equipment

Falcon Darkstar


Deconstructing DeFeNeStRaTe.C

Soldier of FORTRAN

1100
IPv666: Address of the Beast

Christopher Grayson and Marc Newlin


Un-f*$#ing Cloud Storage Encryption

Adam Everspaugh


Reversing SR-IOV For Fun and Profit

Adir Abraham

1200
Patchwerk: Kernel Patching for Fun and Profit

Parker Wiksell and Jewell Seay


IMSI Catchers Demystified

Karl Koscher


Encrypting the Web Isn’t Enough: How EFF Plans to Encrypt the Entire Internet

Jeremy Gillula

1300
Between Two Moose

Whitney Merrill, LosT, Andrew Morris, and Bruce Potter (interviewer)

1400

Closing Remarks