USA 2017: 15 New Briefings Announced
As our Review Board members continue to work their way through a record number of submissions, we are releasing new selections in batches. Below are the most recently announced Briefings, with links to their abstracts.
For a complete list of ALL Briefings selected to date, and to search by specific tracks, click here.
- Automated Detection of Vulnerabilities in Black-Box Routers (and Other Network Devices)
by Gabi Nakibly
- Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
by Kelly Shortridge
- Cloak & Dagger: From Two Permission to Complete Control of the UI Feedback Loop
by Yanick Fratantonio, Simon Pak Ho Chung, Wenke Lee, Chenxiong Qian
- Cyber Wargaming: Lessons Learned in Influencing Security Stakeholders Inside and Outside Your Organization
by Jason Nichols
- Developing Trust and Gitting Betrayed
by Clint Gibler, Noah Beddome
- Don't Trust the DOM: Bypassing XSS Mitigations via Script Gadgets
by Sebastian Lekies, Krzysztof Kotowicz, Eduardo Vela
- Electronegativity - A Study of Electron Security
by Luca Carettoni
- Friday the 13th: JSON Attacks
by Alvaro Muñoz, Oleksandr Mirosh
- Garbage In, Garbage Out: How Purportedly Great Machine Learning Models can be Screwed Up by Bad Data
by Hillary Sanders
- Network Automation is Not Your Safe Haven: Protocol Analysis and Vulnerabilities of Autonomic Network
by Omar Eissa
- New Adventures in Spying 3G and 4G Users: Locate, Track & Monitor
by Ravishankar Borgaonkar, Lucca Hirschi, Andrew Martin, Shinjo Park, Jean-Pierre Seifert, Altaf Shaik
- SS7 Attacker Heaven Turns into Riot: How to Make Nation-State and Intelligence Attackers' Lives Much Harder on Mobile Networks
by Martin Kacer, Philippe Langlois
- The Active Directory Botnet
by Ty Miller, Paul Kalinin
- The Adventures of AV and the Leaky Sandbox
by Itzhak Kotler, Amit Klein
- Why Most Cyber Security Training Fails and What We Can Do About it
by Arun Vishwanath