CSAWthreads 2014 Nov. 13, 2014 to Nov. 14, 2014, Brooklyn,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Robert E. Joyce , Michael Tiffany As the Chief of TAO, Rob leads an organization that provides unique, highly valued capabilities ...
Static Translation of X86 Instruction Semantics to LLVM With McSema Artem Dinaburg , Andrew Ruef This talk will describe how to use LLVM optimization and analysis tools on existing binary ...
Smten and the Art of Satisfiability-based Search Nirav Dave Satisfiability (SAT) and Satisfiability Modulo Theories (SMT) have been used in solving a wide variety ...
Reverse All the Things with PANDA Brendan Dolan-gavitt PANDA is a new, open source dynamic analysis framework based on QEMU that has been ...
Transparent ROP Detection using CPU Performance Counters Xiaoning Li , Michael Crouse Return Oriented Programming (ROP) has become a popular technique employed by exploit writers to deliver ...
Code Pointer Integrity László Szekeres Systems code is mostly written in C/C++ and has memory safety bugs that attackers can ...
Reasoning about Optimal Solutions to Automation Problems Jared Carlson , Andrew Reiter Our research is focused on methods to help automate and scale techniques for recognizing weaknesses ...
Improving Scalable, Automated Baremetal Malware Analysis Paul Royal , Adam Allred The detection of virtualized malware analysis environments has become increasingly popular and commoditized. Sophisticated virtualization ...
Building Your Own DFIR Sidekick Scott J Roberts Even though Decepticons, Cylons, and Johnny 5 may eventually control the world with humanity destroyed ...
CRITs: Collaborative Research Into Threats Wesley Shields , Mike Goffin CRITs (Collaborative Research Into Threats) is an open source malware and threat repository that leverages ...
Cleaning Up the Internet with Scumblr and Sketchy Andy Hoernecke Recently the Netflix Cloud Security team added several open-source tools, Scumblr and Sketchy, to the ...
GitHub AppSec: Keeping up with 111 prolific engineers Ben Toews In the last 30 days 6,603 commits and 797 pull requests have been merged into ...
Augmenting Binary Analysis with Python and Pin Omar Ahmed , Tyler Bohan Reverse engineering typically involves activities ranging from reading disassembly output to playing with debuggers. However, ...
Are attackers using automation more efficiently than defenders? Marc-etienne M.léveillé Operation Windigo is a large, server-side, malware campaign that targets Unix systems (BSD, Linux, OS ...
Automatic Application Security @twitter Neil Matatall What is "security automation"? No really, what is it? Some would say that automation implies ...
Operating system analytics and host intrusion detection at scale Mike Arpaia A critical aspect of maintaining a robust infrastructure security posture is being able to ask ... IncludeThinkstScapes
How Yelp Makes Sense of CSP Reports @ Scale Ivan Leichtling Content Security Policy isn’t new, but it is so powerful that it still feels like ...