Friday, January 16, 2015
Time One Track Mind
1200 Registration Opens
Opening Remarks, Rumblings, and Rants

Bruce Potter

Five Not-Totally-Crazy Ways to Build for Usability

Elissa Shevinsky

Simple Windows Application Whitelisting Evasion

Casey Smith

Don't Look Now! Malicious Image Spam

Kathy Liszka

Userland Persistence on Mac OS X "It Just Works"

Joshua Pitts

SEWiFi: Building a Security Enhanced WiFi Dongle

Ryan Holeman

Betting BIOS Bugs Won't Bite Y'er Butt?

Xeno Kovah and Corey Kallenberg


Keynote Address

Joseph Lorenzo Hall

2000 Infosec Family FUD

Saturday, January 17, 2015
Time Build It! Belay It! Bring it On!
0930 Registration Opens
NSA Playset: USB Tools

Dominic Spill, Michael Ossmann, and Jared Boone

Cockroach Analysis: A Statistical Analysis of the Flash and Java Files that Infest the Internet

David Dorsey

Where the Wild Things Are: Encryption, Police Access & the User

Whitney Merrill

Knock Knock: A Survey of iOS Authentication Methods

David Schuetz

Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass

Jared DeMott

Analysis of POS Malware

Brandon Benson

httpscreenshot - A Tool for Both Teams

Steve Breen and Justin Kennedy

There's Waldo! Tracking Users via Mobile Apps

Colby Moore and Patrick Wardle

Quantum Computing 01100101

Tess Schrodinger

1300 Lunch Break
Automated Binary Analysis with Pin and Python

Omar Ahmed and Tyler Bohan

Practical Machine Learning for Network Security

Terry Nelms

Come to the Dark Side--We Have (Misfortune) Cookies

Lior Oppenheim and Shahar Tal

NaCl: A New Crypto Library

Daniel J. Bernstein and Tanja Lange

The Joy Of Intelligent Proactive Security

Scott Behrens and Andy Hoernecke

Deception for the Cyber Defender: To Err is Human; to Deceive, Divine

Tom Cross, David Raymond, and Gregory Conti

Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry

Kristen K. Greene, Joshua Franklin, and John Kelsey

Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"

Elvis Hovor and Shimon Modi

Rethinking Security's Role in Computer Science Education

Sarah Zatko

0wn the Con

The Shmoo Group

The Windows Sandbox Paradox

James Forshaw

Ask the EFF

Kurt Opsahl and Nate Cardozo

1800 Golden Flag Awards
1830 Fire Talks
2100 Saturday Night Party @ The Washington Hilton

Sunday, January 18, 2015
Time Build It! Belay It! Bring it On!
0930 Registration Opens
White is the New Black: Why White Data Really Matters

Irena Damsky

No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap

Andrew Morris

Crypto Without Computers

Ben Agre

Eliminating Timing Side-channels. A Tutorial.

Peter Schwabe

Infrastructure Tracking with Passive Monitoring and Active Probing

Anthony Kasza and Dhia Mahjoub

Mascots, March Madness & #yogapants: Hacking Goes to College

Chris Cullison, Zack Allen, and Avi Rubin

The Dark Art of Data Visualization

David Pisano

Micronesia: Sub-kernel Kit for Host Introspection in Determining Insider Threat

Loc Nguyen

How Random is Your RNG?

Meltem S╦ćnmez Turan, John Kelsey, and Kerry McKay


Closing Plenary

Get Off My Lawn: Examining Change through the Eyes of The Old Guard

Bruce Potter (moderator), Carole Fennelly, Rick Forno, Ben Laurie, and Space Rogue

1400 Closing Remarks