Friday, January 17, 2014
Time One Track Mind
1230 Registration Opens
Opening Remarks, Rumblings, and Rants

Bruce Potter

Attacker Ghost Stories: Mostly Free Defenses That Give Attackers Nightmares

Mubix "Rob" Fuller

The Evolution of Linux Kernel Module Signing

Rebecca ".bx" Shapiro

How Hackers for Charity (Possibly) Saved Me a Lot of Money

Branden Miller and Emily Miller

CCTV: Setup, Attack Vectors, and Laws

Joshua Schroeder and Spencer Brooks

Security Analytics: Less Hype, More Data

Aaron Gee-Clough

Dissipation of Hackers in the Enterprise



Keynote Address

Privacy Online: What Now?

Ian Goldberg

1945 Fire Talks

Saturday, January 18, 2014
Time Build It! Belay It! Bring it On!
0930 Registration Opens
Genuinely "Trusted Computing:" Free and Open Hardware Security Modules

Ryan Lackey

Introducing DARPA's Cyber Grand Challenge

Mike Walker

Technology Law Issues for Security Professionals

Shannon Brown

Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms

Jaime Sanchez and Pablo San Emeterio

Unambiguous Encapsulation - Separating Data and Signaling

Dominic Spill and Michael Ossmann

I Found a Thing and You Can (Should) Too: ISP's Unauthenticated SOAP Service = Find (Almost) All The Things!

Nicholas Popovich

SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography

Daniel J. Bernstein and Tanja Lange

A Critical Review of Spatial Analysis

David Giametta and Andrew Potter

Arms Race: The Story of (In)-Secure Bootloaders

Lee Harrison and Kang Li

1300 Lunch Break
Controlling USB Flash Drive Controllers: Expose of Hidden Features

Richard Harman

Data Whales and Troll Tears: Beat the Odds in InfoSec

Davi Ottenheimer and Allison Miller

Syncing Mentorship Between Winners And Beginners

Tarah Wheeler Van Vlack and Liz Dahlstrom

0wn the Con

The Shmoo Group

Operationalizing Threat Information Sharing: Beyond Policies and Platitudes

Sean Barnum and Aharon Chernin

The NSA: Capabilities and Countermeasures

Bruce Schneier

AV Evasion With the Veil Framework

Christopher Truncer, Will Schroeder, and Michael Wright

The "Science of Cyber" and the Next Generation of Security Tools

Paulo Shakarian

How to Train your Snapdragon: Exploring Power Frameworks on Android

Josh "m0nk" Thomas

ADD -- Complicating Memory Forensics Through Memory Disarray

Jake Williams and Alissa Torres

Timing-Based Attestation: Sexy Defense, or the Sexiest?

Xeno Kovah, Corey Kallenberg, and John Butterworth

LTE vs. Darwin

Hendrik Schmidt and Brian Butterly

1815 Fire Talks
Saturday Night Party @ The Hilton, International Center Ballroom

Paul and Storm

DJs: Keith Meyers, Zack Fasel, and Erin Jacobs

Sunday, January 19, 2014
Time Build It! Belay It! Bring it On!
0930 Registration Opens
An Open and Affordable USB Man in the Middle Device

Dominic Spill

"How I Met Your Mother" or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age

Benjamin Gatti

Malicious Online Activities Related to the 2012 U.S. General Election

Joshua Franklin, Robert Tarlecki, Matthew Jablonski, and Dr. Damon McCoy

unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback

Kang Li, Xiaoning Li, and Lee Harrison

Raising Costs for Your Attackers Instead of Your CFO

Aaron Beuhring and Kyle Salous

Vehicle Forensics - The Data Beyond the Dashboard

Courtney Lancaster

Introducing idb - Simplified Blackbox iOS App Pentesting

Daniel A. Mayer

Practical Applications of Data Science in Detection

Mike Sconzo and Brian Wylie

You Don't Have the Evidence

Scott Moulton

1300 Room Split Break

Closing Plenary

Large Scale Network and Application Scanning

Bruce Potter (moderator), Robert David Graham, Paul McMillan, Dan Tentler, and Alejandro Caceres

1430 Closing Remarks