USA
Europe
Asia
Regional Summits
Sao Paulo 2014
Archives
Sponsorships
Press
About
About Us
Community
Review Board
Contact Us
Code of Conduct
Privacy
Registration
Pass Comparison Chart
Terms & Conditions
Media Registration
Briefings
Speakers
Roundtables
Exhibit Now
Business Hall
Event Sponsors
Sponsored Workshops
Sponsored Sessions
Sponsor Services
Special Events
Arsenal
Parties and Networking Events
Executive Summit
DEF CON
Trainings
August 2-5
Executive Summit
August 5
Briefings
August 6
Arsenal
August 6
Sponsored Sessions
August 6
Sponsored Workshops
August 6
Briefings
August 7
Arsenal
August 7
Sponsored Sessions
August 7
Sponsored Workshops
August 7
Briefings | August 7
Download Schedule
08:00
Breakfast
Sponsored By
Sponsored By
Sponsored By
09:00
BadUSB - On Accessories that Turn Evil
Karsten Nohl
&
Jakob Lell
Lagoon K
09:00 - 10:00
Epidemiology of Software Vulnerabilities: A Study of Attack Surface Spread
Kymberlee Price
&
Jake Kouns
South Seas GH
09:00 - 09:25
How Smartcard Payment Systems Fail
Ross Anderson
South Seas F
09:00 - 10:00
I Know Your Filtering Policy Better than You Do: External Enumeration and Exploitation of Email and Web Security Solutions
Ben Williams
South Seas IJ
09:00 - 10:00
It Just (Net)works: The Truth About iOS 7's Multipeer Connectivity Framework
Alban Diquet
South Seas CD
09:00 - 09:25
Mobile Security Roundtable: What Does Mobile Security Look Like Today? What Will it Look Like Tomorrow?
Vincenzo Iozzo
&
Peiter Zatko
&
Ian Robertson
&
Dino Dai Zovi
Palm A
09:00 - 10:00
Reverse-Engineering the Supra iBox: Exploitation of a Hardened MSP430-Based Device
Braden Thomas
South Seas AB
09:00 - 10:00
Stay Out of the Kitchen: A DLP Security Bake-Off
Zach Lanier
&
Kelly Lum
Jasmine Ballroom
09:00 - 10:00
The New Scourge of Ransomware: A Study of CryptoLocker and Its Friends
Lance James
&
John Bambenek
Mandalay Bay D
09:00 - 10:00
Write Once, Pwn Anywhere
Yang Yu
South Seas E
09:00 - 10:00
09:35
Abuse of CPE Devices and Recommended Fixes
Jonathan Spring
&
Paul Vixie
&
Chris Hallenbeck
South Seas CD
09:35 - 10:00
One Packer to Rule Them All: Empirical Identification, Comparison, and Circumvention of Current Antivirus Detection Techniques
Alaeddine Mesbahi
&
Arne Swinnen
South Seas GH
09:35 - 10:00
10:15
A Practical Attack Against VDI Solutions
Daniel Brodie
&
Michael Shaulov
Jasmine Ballroom
10:15 - 11:15
Bitcoin Transaction Malleability Theory in Practice
Daniel Chechik
&
Ben Hayak
South Seas CD
10:15 - 11:15
Building Safe Systems at Scale - Lessons from Six Months at Yahoo
Alex Stamos
Lagoon K
10:15 - 11:15
Extreme Privilege Escalation on Windows 8/UEFI Systems
Corey Kallenberg
&
Xeno Kovah
&
Samuel Cornwell
&
John Butterworth
Mandalay Bay D
10:15 - 11:15
ICSCorsair: How I Will PWN Your ERP Through 4-20 mA Current Loop
Alexander Bolshev
&
Gleb Cherbov
South Seas AB
10:15 - 11:15
Leviathan: Command and Control Communications on Planet Earth
Kenneth Geers
&
Kevin Thompson
South Seas F
10:15 - 11:15
Medical Devices Roundtable: Is There a Doctor in the House? Security and Privacy in the Medical World
Jay Radcliffe
Palm A
10:15 - 11:15
Saving Cyberspace
Jason Healey
South Seas E
10:15 - 11:15
Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs
Tao Wei
&
Yulong Zhang
South Seas GH
10:15 - 10:40
When the Lights Go Out: Hacking Cisco EnergyWise
Matthias Luft
&
Ayhan Soner Koca
South Seas IJ
10:15 - 11:15
10:50
Threat Intelligence Library - A New Revolutionary Technology to Enhance the SOC Battle Rhythm!
Ryan Trost
South Seas GH
10:50 - 00:00
11:15
Coffee Service
Sponsored By
Sponsored By
Sponsored By
11:45
Abusing Microsoft Kerberos: Sorry You Guys Don't Get It
Alva Duckwall
&
Benjamin Delpy
South Seas CD
11:45 - 12:45
Exploiting Unpatched iOS Vulnerabilities for Fun and Profit
Yeongjin Jang
&
Tielei Wang
&
Byoungyoung Lee
&
Billy Lau
South Seas E
11:45 - 12:45
GRR: Find All the Badness, Collect All the Things
Greg Castle
South Seas GH
11:45 - 12:45
Internet Scanning - Current State and Lessons Learned
Mark Schloesser
South Seas IJ
11:45 - 12:10
Mission mPOSsible
Nils
&
Jon Butler
Lagoon K
11:45 - 12:45
MoRE Shadow Walker: The Progression of TLB-Splitting on x86
Jacob Torrey
South Seas AB
11:45 - 12:45
Pragmatic Security Automation Roundtable
Rich Mogull
Palm A
11:45 - 12:45
RAVAGE - Runtime Analysis of Vulnerabilities and Generation of Exploits
Xiaoran Wang
&
Yoel Gluck
Jasmine Ballroom
11:45 - 12:45
Smart Nest Thermostat: A Smart Spy in Your Home
Yier Jin
&
Grant Hernandez
&
Daniel Buentello
Mandalay Bay D
11:45 - 12:45
Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways
Brian Gorenc
&
Jasiel Spelman
South Seas F
11:45 - 12:45
12:20
From Attacks to Action - Building a Usable Threat Model to Drive Defensive Choices
Tony Sager
South Seas IJ
12:20 - 12:45
12:45
Lunch
14:15
48 Dirty Little Secrets Cryptographers Don't Want You To Know
Thomas Ptacek
&
Alex Balducci
Lagoon K
14:15 - 15:15
Be Mean to Your Code Roundtable: Security in the Age of Continuous Integration & Deployment
Matt Johansen
Palm A
14:15 - 15:15
Miniaturization
Jason Larsen
South Seas AB
14:15 - 15:15
"Nobody is Listening to Your Phone Calls." Really? A Debate and Discussion on the NSA's Activities
Mark Jaycox
&
Jamil Jaffer
South Seas F
14:15 - 15:15
SVG: Exploiting Browsers without Image Parsing Bugs
Rennie deGraaf
South Seas CD
14:15 - 14:40
The Devil Does Not Exist - The Role of Deception in Cyber
Mark Mateski
&
Matt Devost
South Seas E
14:15 - 15:15
The State of Incident Response
Bruce Schneier
Mandalay Bay D
14:15 - 15:15
Time Trial: Racing Towards Practical Timing Attacks
Daniel Mayer
&
Joel Sandin
Jasmine Ballroom
14:15 - 15:15
14:50
Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications
Daniele Gallingani
South Seas CD
14:50 - 15:15
15:15
Break
15:30
A Journey to Protect Points-of-Sale
Nir Valtman
South Seas IJ
15:30 - 16:30
Call To Arms: A Tale of the Weaknesses of Current Client-Side XSS Filtering
Martin Johns
&
Ben Stock
&
Sebastian Lekies
Mandalay Bay D
15:30 - 16:30
Catching Malware En Masse: DNS and IP Style
Dhia Mahjoub
&
Thibault Reuille
&
Andree Toonk
South Seas AB
15:30 - 16:30
Fingerprinting Web Application Platforms by Variations in PNG Implementations
Dominique Bongard
South Seas GH
15:30 - 15:55
Lifecycle of a Phone Fraudster: Exposing Fraud Activity from Reconnaissance to Takeover Using Graph Analysis and Acoustical Anomalies
Vijay Balasubramaniyan
&
Raj Bandyopadhyay
&
Telvis Calhoun
South Seas E
15:30 - 16:30
SAP, Credit Cards, and the Bird that Talks Too Much
Ertunga Arsal
South Seas F
15:30 - 16:30
SATCOM Terminals: Hacking by Air, Sea, and Land
Ruben Santamarta
Lagoon K
15:30 - 16:30
Security and Software Defined Networking Roundtable: New Exposures or New Opportunities?
Robert Stratton
Palm A
15:30 - 16:30
Understanding IMSI Privacy
Ravishankar Borgaonkar
&
Swapnil Udar
Jasmine Ballroom
15:30 - 16:30
Why You Need to Detect More Than PtH
Matthew Hathaway
&
Jeff Myers
South Seas CD
15:30 - 16:30
16:05
Investigating PowerShell Attacks
Ryan Kazanciyan
&
Matt Hastings
South Seas GH
16:05 - 16:30
16:30
Coffee Service
Sponsored By
Sponsored By
Sponsored By
17:00
Capstone: Next Generation Disassembly Framework
Quynh Nguyen Anh
South Seas CD
17:00 - 18:00
Creating a Spider Goat: Using Transactional Memory Support for Security
Igor Muttik
&
Alex Nayshtut
South Seas E
17:00 - 18:00
Exposing Bootkits with BIOS Emulation
Lars Haukli
South Seas AB
17:00 - 18:00
Hacking the Wireless World with Software Defined Radio - 2.0
Balint Seeber
Lagoon K
17:00 - 18:00
Poacher Turned Gamekeeper: Lessons Learned from Eight Years of Breaking Hypervisors
Rafal Wojtczuk
Mandalay Bay D
17:00 - 18:00
Probabilistic Spying on Encrypted Tunnels
Brandon Niemczyk
&
Prasad Rao
South Seas IJ
17:00 - 17:25
The New Page of Injections Book: Memcached Injections
Ivan Novikov
South Seas F
17:00 - 18:00
Understanding TOCTTOU in the Windows Kernel Font Scaler Engine
Yu Wang
Jasmine Ballroom
17:00 - 18:00
Unwrapping the Truth: Analysis of Mobile Application Wrapping Solutions
Ron Gutierrez
&
Stephen Komal
South Seas GH
17:00 - 18:00
17:35
Badger - The Networked Security State Estimation Toolkit
Edmond Rogers
&
William Rogers
&
Gabe Weaver
South Seas IJ
17:35 - 18:00
18:00
End of Day