USA 2016: May 18 Selections- 35 More New Briefings Announced
As our Review Board members continue to work their way through a record number of submissions, we are releasing new selections in batches. Below are the most recently announced Briefings, with links to their abstracts.
For a complete list of ALL Briefings selected to date, and to search by specific tracks, click here.
- Abusing HL7 2.x Standards - Attacking Medical Devices, Hospitals and More
by Anirudh Duggal
- Account Jumping, Post Infection Persistency & Lateral Movement in AWS
by Dan Amiga, Dor Knafo
- Advanced CAN Injection Techniques for Vehicle Networks
by Charlie Miller, Chris Valasek
- Applied Machine Learning for Data Exfil and Other Fun Topics
by Brian Wallace, Matt Wolff
- Augmenting Static Analysis Using Pintool: Ablation
by Paul Mehta
- BadTunnel: How Do I Get Big Brother Power?
by Yang Yu
- Beyond the MCSE: Active Directory for the Security Professional
by Sean Metcalf
- Breaking Hardware-Enforced Security with Hypervisors
by Joseph Sharkey
- Breaking Payment Points of Interaction (POI)
by Nir Valtman, Patrick Watson
- Brute-Forcing Lockdown Harddrive PIN Codes
by Colin O'Flynn
- Building Trust & Enabling Innovation for Voice Enabled IoT
by Lynn Terwoerds
- Cunning with CNG: Soliciting Secrets from Schannel
by Jake Kambic
- Design Approaches for Security Automation
by Peleus Uhley
- Drone Attacks on Industrial Wireless: A New Front in Cyber Security
by Jeff Melrose
- Dungeons, Dragons and Securitye
by Tiphaine Romand Latapie
- GreatFET: Making GoodFET Great Again
by Michael Ossmann
- Hacking Next-Gen ATMs: From Capture to Cashout
by Weston Hecker
- Hackproofing Oracle eBusiness Suite
by David Litchfield
- Hardening AWS Environments and Automating Incident Response for AWS Compromises
by Alex McCormack, Andrew Krug
- How To Build The Immune System For The Internets
by Xiaodun Fang
- Keystone Engine: Next Generation Assembler Framework
by Quynh Nguyen Anh
- Memory Forensics Using Virtual Machine Introspection for Cloud Computing
by Tobias Zillner
- On Navigating the Rocky Terrain of Enterprise Autonomous Vehicle Security and Functional Safety
by John Moore
- OSS Security Maturity: Time To Put On Your Big Boy Pants!
by Christine Gadsby, Jake Kouns
- Ouroboros: Tearing Xen Hypervisor with the Snake
by Shangcong Luan
- PLC-Blaster: A Worm Living Solely in the PLC
by Hendrik Schwartke, Maik Brüggemann, Ralf Spenneberg
- Side-Channel Attacks on Everyday Applications
by Taylor Hornby
- The Art of Reverse Engineering Flash Exploits
by Jeong Wook Oh
- The Remote Malicious Butler Did It!
by Tal Be'ery
- The Risk from Power Lines: How to Sniff the G3 and Prime Data and Detec the Interfere Attack
by Lei Ji
- The Tao of Hardware, the Te of Implants
by Joe FitzPatrick
- Using Undocumented CPU Behavior to See into Kernel Mode and Break KASRL in the Process
by Anders Fogh, Daniel Gruss
- When the Cops Come A-Knocking: Handling Technical Assistance Demands from Law Enforcement
by Jennifer Granick, Riana Pfefferkorn
- Windows 10 Mitigation Improvements
by David Weston, Matt Miller
- Xenpwn: Breaking Paravirtualized Devices
by Felix Wilhelm