Schedule

Friday, January 16, 2015
Time One Track Mind
1200 Registration Opens
1430
Opening Remarks, Rumblings, and Rants

Bruce Potter

1530
Five Not-Totally-Crazy Ways to Build for Usability

Elissa Shevinsky

1600
Simple Windows Application Whitelisting Evasion

Casey Smith

1630
Don't Look Now! Malicious Image Spam

Kathy Liszka

1700
Userland Persistence on Mac OS X "It Just Works"

Joshua Pitts

1730
SEWiFi: Building a Security Enhanced WiFi Dongle

Ryan Holeman

1800
Betting BIOS Bugs Won't Bite Y'er Butt?

Xeno Kovah and Corey Kallenberg

1830

Keynote Address

Joseph Lorenzo Hall

2000 Infosec Family FUD

Saturday, January 17, 2015
Time Build It! Belay It! Bring it On!
0930 Registration Opens
1000
NSA Playset: USB Tools

Dominic Spill, Michael Ossmann, and Jared Boone


Cockroach Analysis: A Statistical Analysis of the Flash and Java Files that Infest the Internet

David Dorsey


Where the Wild Things Are: Encryption, Police Access & the User

Whitney Merrill

1100
Knock Knock: A Survey of iOS Authentication Methods

David Schuetz


Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass

Jared DeMott


Analysis of POS Malware

Brandon Benson

1200
httpscreenshot - A Tool for Both Teams

Steve Breen and Justin Kennedy


There's Waldo! Tracking Users via Mobile Apps

Colby Moore and Patrick Wardle


Quantum Computing 01100101

Tess Schrodinger

1300 Lunch Break
1400
Automated Binary Analysis with Pin and Python

Omar Ahmed and Tyler Bohan


Practical Machine Learning for Network Security

Terry Nelms


Come to the Dark Side--We Have (Misfortune) Cookies

Lior Oppenheim and Shahar Tal

1500
NaCl: A New Crypto Library

Daniel J. Bernstein and Tanja Lange


The Joy Of Intelligent Proactive Security

Scott Behrens and Andy Hoernecke


Deception for the Cyber Defender: To Err is Human; to Deceive, Divine

Tom Cross, David Raymond, and Gregory Conti

1600
Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry

Kristen K. Greene, Joshua Franklin, and John Kelsey


Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"

Elvis Hovor and Shimon Modi


Rethinking Security's Role in Computer Science Education

Sarah Zatko

1700
0wn the Con

The Shmoo Group


The Windows Sandbox Paradox

James Forshaw


Ask the EFF

Kurt Opsahl and Nate Cardozo

1800 Golden Flag Awards
1830 Fire Talks
2100 Saturday Night Party @ The Washington Hilton

Sunday, January 18, 2015
Time Build It! Belay It! Bring it On!
0930 Registration Opens
1000
White is the New Black: Why White Data Really Matters

Irena Damsky


No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap

Andrew Morris


Crypto Without Computers

Ben Agre

1100
Eliminating Timing Side-channels. A Tutorial.

Peter Schwabe


Infrastructure Tracking with Passive Monitoring and Active Probing

Anthony Kasza and Dhia Mahjoub


Mascots, March Madness & #yogapants: Hacking Goes to College

Chris Cullison, Zack Allen, and Avi Rubin

1200
The Dark Art of Data Visualization

David Pisano


Micronesia: Sub-kernel Kit for Host Introspection in Determining Insider Threat

Loc Nguyen


How Random is Your RNG?

Meltem S╦ćnmez Turan, John Kelsey, and Kerry McKay

1300

Closing Plenary

Get Off My Lawn: Examining Change through the Eyes of The Old Guard

Bruce Potter (moderator), Carole Fennelly, Rick Forno, Ben Laurie, and Space Rogue

1400 Closing Remarks