Schedule

Friday, January 17, 2014
Time One Track Mind
1230 Registration Opens
1430
Opening Remarks, Rumblings, and Rants

Bruce Potter

1530
Attacker Ghost Stories: Mostly Free Defenses That Give Attackers Nightmares

Mubix "Rob" Fuller

1600
The Evolution of Linux Kernel Module Signing

Rebecca ".bx" Shapiro

1630
How Hackers for Charity (Possibly) Saved Me a Lot of Money

Branden Miller and Emily Miller

1700
CCTV: Setup, Attack Vectors, and Laws

Joshua Schroeder and Spencer Brooks

1730
Security Analytics: Less Hype, More Data

Aaron Gee-Clough

1800
Dissipation of Hackers in the Enterprise

Weasel

1830

Keynote Address

Privacy Online: What Now?

Ian Goldberg

1945 Fire Talks

Saturday, January 18, 2014
Time Build It! Belay It! Bring it On!
0930 Registration Opens
1000
Genuinely "Trusted Computing:" Free and Open Hardware Security Modules

Ryan Lackey


Introducing DARPA's Cyber Grand Challenge

Mike Walker


Technology Law Issues for Security Professionals

Shannon Brown

1100
Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms

Jaime Sanchez and Pablo San Emeterio


Unambiguous Encapsulation - Separating Data and Signaling

Dominic Spill and Michael Ossmann


I Found a Thing and You Can (Should) Too: ISP's Unauthenticated SOAP Service = Find (Almost) All The Things!

Nicholas Popovich

1200
SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography

Daniel J. Bernstein and Tanja Lange


A Critical Review of Spatial Analysis

David Giametta and Andrew Potter


Arms Race: The Story of (In)-Secure Bootloaders

Lee Harrison and Kang Li

1300 Lunch Break
1400
Controlling USB Flash Drive Controllers: Expose of Hidden Features

Richard Harman


Data Whales and Troll Tears: Beat the Odds in InfoSec

Davi Ottenheimer and Allison Miller


Syncing Mentorship Between Winners And Beginners

Tarah Wheeler Van Vlack and Liz Dahlstrom

1500
0wn the Con

The Shmoo Group


Operationalizing Threat Information Sharing: Beyond Policies and Platitudes

Sean Barnum and Aharon Chernin


The NSA: Capabilities and Countermeasures

Bruce Schneier

1600
AV Evasion With the Veil Framework

Christopher Truncer, Will Schroeder, and Michael Wright


The "Science of Cyber" and the Next Generation of Security Tools

Paulo Shakarian


How to Train your Snapdragon: Exploring Power Frameworks on Android

Josh "m0nk" Thomas

1700
ADD -- Complicating Memory Forensics Through Memory Disarray

Jake Williams and Alissa Torres


Timing-Based Attestation: Sexy Defense, or the Sexiest?

Xeno Kovah, Corey Kallenberg, and John Butterworth


LTE vs. Darwin

Hendrik Schmidt and Brian Butterly

1815 Fire Talks
2015
Saturday Night Party @ The Hilton, International Center Ballroom

Paul and Storm

DJs: Keith Meyers, Zack Fasel, and Erin Jacobs


Sunday, January 19, 2014
Time Build It! Belay It! Bring it On!
0930 Registration Opens
1000
An Open and Affordable USB Man in the Middle Device

Dominic Spill


"How I Met Your Mother" or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age

Benjamin Gatti


Malicious Online Activities Related to the 2012 U.S. General Election

Joshua Franklin, Robert Tarlecki, Matthew Jablonski, and Dr. Damon McCoy

1100
unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback

Kang Li, Xiaoning Li, and Lee Harrison


Raising Costs for Your Attackers Instead of Your CFO

Aaron Beuhring and Kyle Salous


Vehicle Forensics - The Data Beyond the Dashboard

Courtney Lancaster

1200
Introducing idb - Simplified Blackbox iOS App Pentesting

Daniel A. Mayer


Practical Applications of Data Science in Detection

Mike Sconzo and Brian Wylie


You Don't Have the Evidence

Scott Moulton

1300 Room Split Break
1330

Closing Plenary

Large Scale Network and Application Scanning

Bruce Potter (moderator), Robert David Graham, Paul McMillan, Dan Tentler, and Alejandro Caceres

1430 Closing Remarks