Software, Systems and Hardware

"I made the very model, but the model was too general: Modeling every cyber vegetable, animal, and mineral"

David Jakob FritzSandia National Laboratories

"Why Memory Corruption is Hard"  [Video]
Mathias Payer, Purdue University

"Can Trust Be Delivered As a Service?"
Margaret Loper, Institute for Information Security & Privacy

"Tracing the Arc of Smartphone Application Security"  [Video]
Patrick McDaniel, professor and director, Institute for Network and Security Research, The Pennsylvania State University