This information is also available at Khan Fu.

Friday, January 18, 2019
Time One Track Mind
1200 Registration Opens

Opening Remarks, Rumblings, Ruminations, and Rants

Incident Response and the Attorney Client Privilege

Wendy Knox Everette

Ad-Laundering: Bribes & Backdoors

John Amirrezvani

Machine Learning Models that Predict Mental Health Status on Twitter and Their Privacy Implications

Janith Weerasingh and Rachel Greenstadt

How the Press Gets Pwned

David Huerta

Kinder Garten Security: Teaching the Pre-college Crowd

Sandra Gorka and Jacob Miller

It’s 2019 and Special Agent Johnny Still Can’t Encrypt

Matt Blaze

Time Firetalks

Firetalks Opening

Shut up and Listen

Kirsten Renner

Specialists versus Jack-Of-All-Trades

Nicole Schwartz

Équipe Rouge: The Ethics of Prosecuting An Offensive Security Campaign

Tarah Wheeler and Roy Iversen

Weapons of Text Destruction

Jared Stroud

Infosec and 9-1-1: When the Location of Your Emergency is in the Building

Christine Giglio

Whats the latest 411 on 419s?

Ray [Redacted]


Firetalks Closing

Saturday, January 19, 2019
Time Build It! Belay It! Bring it On!
0930 Registration Opens
Writing a Fuzzer for Any Language with American Fuzzy Lop

Ariel Zelivansky

High Confidence Malware Attribution using the Rich Header

Kevin Bilzer, RJ Joyce, and Seamus Burke

The Beginner’s Guide to the Musical Scales of Cyberwar

Jessica ‘Zhanna’ Malekos Smith

CryptoLocker Deep-Dive: Tracking security threats on the Bitcoin public ledger

Olivia Thet and Nicolas Kseib

BECs and Beyond: Investigating and Defending Office 365

Douglas Bienstock

The APT at Home: The attacker that knows your mother’s maiden name

Chris Cox

Process Control Through Counterfeit Comms: Using and Abusing Built-In Functionality to Own a PLC

Jared Rittle

Five-sigma Network Events (and how to find them)

John O’Neil

Firemen vs. Safety Matches: How the current skills pipeline is wrong

Amélie Koran

1300 Break
Be an IoT Safety Hero: Policing Unsafe IoT through the Consumer Product Safety Commission

Andrea Matwyshyn and Elliot Kaye

Electronic Voting in 2018: Bad or Worse?

Matt Blaze

Ground Truth: 18 vendors, 6000 firmware images, 2.7 million binaries, and a flaw in the Linux/MIPS stack

Parker Thompson, Mudge, and Tim Carstens

Trip Wire(less)


Analyzing Shodan Images With Optical Character Recognition

Michael Portera

Advancing a Scientific Approach to Security Tool Evaluations with MITRE ATT&CK™

Francis Duff

Social Network Analysis: A scary primer

Andrew Wong and Phil Vachon

Security Response Survival Skills

Ben Ridgway

Mentoring the Intelligent Deviant: What the special operations and infosec communities can learn from each other

Nina Kollars and Paul Brister

Three Ways DuckDuckGo Protects User Privacy While Getting Things Done (and how you can too)

Marc Soda

iPhone Surgery for the Practically Paranoid

Evan Jensen and Rudy Cuevas

A Little Birdy Told Me About Your Warrants

Avi Zajac

Post-quantum Crypto: Today’s defense against tomorrow’s quantum hacker

Christian Paquin

A Code Pirate’s Cutlass: Recovering Software Architecture from Embedded Binaries


A Tisket, a Tasket, a Dark Web Shopping Basket

Emma Zaballos and Anne Addison Meriwether

24/7 CTI: Operationalizing Cyber Threat Intelligence

Xena Olsen

0wn the Con

The Shmoo Group

Behind Enemy Lines: Inside the operations of a nation state’s cyber program

Andrew Blaich and Michael Flossman

2100 Saturday Night Party

Sunday, January 20, 2019
Time Build It! Belay It! Bring it On!
0930 Registration Opens
Building and Selling Solo, an Open Source Secure Hardware Token

Conor Patrick

Looking for Malicious Hardware Implants with Minimal Equipment

Falcon Darkstar

Deconstructing DeFeNeStRaTe.C

Soldier of FORTRAN

IPv666: Address of the Beast

Christopher Grayson and Marc Newlin

Un-f*$#ing Cloud Storage Encryption

Adam Everspaugh

Reversing SR-IOV For Fun and Profit

Adir Abraham

Patchwerk: Kernel Patching for Fun and Profit

Parker Wiksell and Jewell Seay

IMSI Catchers Demystified

Karl Koscher

Encrypting the Web Isn’t Enough: How EFF Plans to Encrypt the Entire Internet

Jeremy Gillula

Between Two Moose

Whitney Merrill, LosT, Andrew Morris, and Bruce Potter (interviewer)


Closing Remarks