PDT Times |
Title |
speaker |
| | |
Friday |
|
|
08:00 - 08:25 |
Hack-A-Sat Launch Party
|
|
08:30 - 15:59 |
Hack-a-Sat
|
|
08:00 - 19:59 |
A-ISAC CTF
|
|
09:00 - 15:59 |
Cal Poly Workshop - Simulated Satellite Communicat . . .
|
|
09:00 - 15:59 |
Deep Space Networking
|
|
09:00 - 15:59 |
Nyan Sat Workshop
|
|
09:00 - 15:59 |
Aviation Privacy Treasure Hunt
|
Martin Strohmeier |
09:00 - 15:59 |
Mission Alenium: Launching the Next Generation int . . .
|
Henry Danielson |
10:00 - 10:59 |
Opening Remarks: Getting The Aerospace Village To . . .
|
Chris Krebs,Dr Will Roper . . . |
10:00 - 13:30 |
Understanding Space Through a CyberSecurity Lens
|
|
11:00 - 11:59 |
MITM - The Mystery In The Middle. An Introduction . . .
|
Matt Gaffney |
12:00 - 12:30 |
Satellite Orbits 101
|
Matt Murray |
12:30 - 12:59 |
GPS Spoofing 101
|
Harshad Sathaye |
12:00 - 17:59 |
Bricks in the Air
|
|
12:00 - 17:59 |
CPX SimpleSat
|
|
12:00 - 17:59 |
DDSAT-1
|
|
13:00 - 13:59 |
Building Connections Across The Aviation Ecosystem
|
Katie Noble,Al Burke,Jeff . . . |
14:00 - 14:59 |
Experimental Aviation, Risks And Rewards
|
Patrick Kiley |
14:30 - 17:59 |
Understanding Space Through a CyberSecurity Lens
|
|
15:00 - 15:59 |
Talking To Satellites - 101
|
Eric Escobar |
16:00 - 16:30 |
Hack-A-Sat Friday Recap
|
|
17:00 - 17:59 |
Exploiting Spacecraft
|
Brandon Bailey |
| | |
Saturday |
|
|
08:30 - 08:59 |
Attacking Flight Management Systems: This Is Your . . .
|
Javad Dadgar,Mohammad-Rez . . . |
08:00 - 19:59 |
A-ISAC CTF
|
|
09:00 - 09:30 |
Hack-A-Sat Kickoff Segment
|
|
09:30 - 09:59 |
Aerospace Village Badge
|
Rick Hansen |
09:30 - 15:59 |
Hack-a-Sat
|
|
09:00 - 15:59 |
Bricks in the Air
|
|
09:00 - 15:59 |
Cal Poly Workshop - Simulated Satellite Communicat . . .
|
|
09:00 - 15:59 |
CPX SimpleSat
|
|
09:00 - 15:59 |
DDSAT-1
|
|
09:00 - 15:59 |
Deep Space Networking
|
|
09:00 - 15:59 |
Nyan Sat Workshop
|
|
09:00 - 12:30 |
Understanding Space Through a CyberSecurity Lens
|
|
09:00 - 15:59 |
Mission Alenium: Launching the Next Generation int . . .
|
Henry Danielson |
10:00 - 10:59 |
Hackers And ISACS
|
Erin Miller,Jeff Troy,Ken . . . |
11:00 - 11:30 |
A View From The Cockpit: Exploring Pilot Reactions . . .
|
Matt Smith |
11:30 - 11:59 |
Checklist For Aviation Vulnerability Disclosure: D . . .
|
Jay Angus |
12:00 - 12:59 |
Low-Cost VHF Receiver: Eavesdropping Pilot/Control . . .
|
Allan Tart,Fabian Landis |
13:00 - 13:30 |
Product Cybersecurity: Secure Airplane Development . . .
|
Michael Vanguardia |
13:30 - 13:59 |
Introduction To ACARS
|
Alex Lomas |
13:30 - 16:59 |
Understanding Space Through a CyberSecurity Lens
|
|
14:00 - 14:59 |
Ticketing To Takeoff: An Airport Hacking Choose Yo . . .
|
Liz Wharton |
15:00 - 15:30 |
ILS and TCAS Spoofing Demonstration
|
Alex Lomas |
15:30 - 15:59 |
A Deeper Dive Into ILS And ADS-B Spoofing
|
Harshad Sathaye |
16:00 - 16:30 |
Hack-A-Sat End Of Day Recap
|
|
17:00 - 17:59 |
General Aviation (GA) Electronic Flight Bags (EFB)
|
David Robinson |
| | |
Sunday |
|
|
08:30 - 08:59 |
Hacking Airplane Air To Ground (A2G) Systems
|
Ali Abdollahi |
09:00 - 09:59 |
Hacking Aerospace Cybersecurity Regulation
|
Harley Geiger,Kaylin Tryc . . . |
09:00 - 13:59 |
Hack-a-Sat
|
|
09:00 - 13:59 |
Bricks in the Air
|
|
09:00 - 15:59 |
Cal Poly Workshop - Simulated Satellite Communicat . . .
|
|
09:00 - 13:59 |
CPX SimpleSat
|
|
09:00 - 13:59 |
DDSAT-1
|
|
09:00 - 15:59 |
Deep Space Networking
|
|
09:00 - 13:59 |
Nyan Sat Workshop
|
|
09:00 - 12:30 |
Understanding Space Through a CyberSecurity Lens
|
|
10:00 - 10:30 |
Trust And Truth In Space Situational Awareness
|
James Pavur |
10:30 - 10:59 |
747 Walkthrough From A Hacker's Perspective
|
Alex Lomas,Ken Munro |
11:00 - 11:59 |
Critical Aerospace Cybersecurity: How Hacking And . . .
|
Lawrence Rowell,Nathalie . . . |
12:00 - 12:59 |
Cybersecurity Lessons Learned From Human Spaceflig . . .
|
Pam Melroy |
13:00 - 13:30 |
Dissecting Wireless Privacy In Aviation
|
Martin Strohmeier |
13:30 - 13:59 |
Breakdown Of The FAA's Privacy ICAO Address Progra . . .
|
Gui Michel |
14:00 - 14:59 |
Hack-A-Sat Closing Segment
|
|
15:00 - 15:59 |
Cybersecurity Meets Aviation Regulation
|
Aaron Cornelius,Tim Brom |
16:00 - 16:59 |
What I Learned Trying To Hack A 737
|
Karl Koscher |
PDT Times |
Title |
speaker |
| | |
Thursday |
|
|
09:00 - 09:59 |
Blue Team Village - Opening Ceremony
|
|
10:15 - 10:59 |
Graylog: An Introduction Into OpenSOC CTF Tools
|
Lennart Koopmann |
| | |
Friday |
|
|
10:00 - 10:30 |
Quark Engine - An Obfuscation-Neglect Android Malw . . .
|
JunWei Song,KunYu Chen |
11:00 - 11:59 |
OuterHaven - The UEFI Memory Space Just Itching to . . .
|
Connor Morley |
12:30 - 12:59 |
No Question: Teamviewer, Police and Consequence (B . . .
|
corvusactual |
13:30 - 14:30 |
Building BLUESPAWN: An Open-Source, Active Defense . . .
|
Jake Smith,Jack McDowell |
15:00 - 15:30 |
Indicators of Emulation (Intermediate)
|
Ch33r10 |
16:00 - 16:30 |
Detecting The Not-PowerShell Gang (Intermediate)
|
Mangatas Tondang |
17:00 - 17:59 |
Discovering ELK The First Time - Lessons Learned O . . .
|
TheDrPinky |
18:30 - 18:59 |
Fighting a Virus with a Spreadsheet (Beginner)
|
Allen Baranov |
19:30 - 20:30 |
Purple On My Mind: Cost Effective Automated Advers . . .
|
Mauricio Velazco |
| | |
Saturday |
|
|
09:00 - 09:59 |
Reversing with Dynamic Data Resolver (DDR) – Bes . . .
|
Holger Unterbrink |
10:30 - 10:59 |
O365Squatting (Intermediate)
|
Juan Francisco,Jose Migue . . . |
11:30 - 11:59 |
Low Value Indicators For High Value Decisions (Int . . .
|
Allan Stojanovic,Spencer . . . |
12:30 - 13:30 |
Incident Response Panel
|
Russell Mosley,Vyrus,Litm . . . |
14:00 - 14:59 |
Blue Team Village & Red Team Village Panel
|
Joseph Mlodzìanowskì (c . . . |
15:30 - 16:30 |
Practical Advice on Threat Hunting Panel
|
Plug,Roberto Rodriguez,To . . . |
17:00 - 17:59 |
Introducing the Meet a Mentor Program
|
Scoubi,Plug,Litmoose,Xavi . . . |
| | |
Sunday |
|
|
16:00 - 16:59 |
Blue Team Village Closing Ceremony
|
|
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 10:59 |
STARTTLS is Dangerous
|
Hanno Böck |
11:00 - 11:59 |
LadderLeak: Breaking ECDSA With Less Than One Bit . . .
|
Akira Takahashi,F. Novae . . . |
12:00 - 12:59 |
The Norwegian Blue: A lesson in Privacy Engineerin . . .
|
Eivind Arvesen |
13:00 - 13:59 |
Dos, Donts and How-Tos of crypto building blocks u . . .
|
Mansi Sheth |
14:00 - 14:59 |
How to store sensitive information in 2020?
|
Mansi Sheth |
15:00 - 15:59 |
Workshop: Let's Talk About Abusability Testing
|
Avi Zajac,Franchesca Spek . . . |
16:00 - 16:59 |
DNS Privacy
|
Matt Cheung |
17:00 - 17:59 |
Fireside Chat: All about Section 230, the EARN IT . . .
|
Cathy Gellis,Riana Pfeffe . . . |
| | |
Saturday |
|
|
10:00 - 10:59 |
Quantum Computers & Cryptography
|
I. Shaheem |
11:00 - 11:30 |
Online Ads as a Recon and Surveillance Tool
|
Neil M |
11:30 - 11:59 |
Who needs spyware when you have COVID-19 apps? A l . . .
|
C. Nadal,J. DeBlois,M. . . . |
12:00 - 12:59 |
Differential Privacy..more important than ever in . . .
|
Aditi Joshi |
13:00 - 13:59 |
Rights You Can’t Exercise Can’t Protect You: P . . .
|
Ben Brook,Maritza Johnson . . . |
14:00 - 14:59 |
Hacking like Paris Hilton 14 years later - and sti . . .
|
Per Thorsheim |
15:00 - 15:59 |
Online Voting: Theory and Practice
|
Emily Stamm,Porter Adams |
16:00 - 16:59 |
Next level stalker ware
|
Cecilie Wian |
17:00 - 17:59 |
Workshop: Let's Talk About Abusability Testing
|
Avi Zajac,Franchesca Spek . . . |
| | |
Sunday |
|
|
10:30 - 10:59 |
European regulatory trends for Artificial Intellig . . .
|
Julia Reinhardt |
11:00 - 11:30 |
Fear, Uncertainty, and Doubt about Human Microchip . . .
|
Zhanna Malekos Smith |
11:30 - 11:59 |
What if we had TLS for phone numbers? An introduct . . .
|
Kelley Robinson |
12:00 - 12:59 |
Workshop: Let's Talk About Abusability Testing
|
Avi Zajac,Franchesca Spek . . . |
13:00 - 13:30 |
File Encryption For Actual Humans
|
David Kane-Parry |
PDT Times |
Title |
speaker |
| | |
Thursday |
|
|
09:30 - 09:59 |
Discovering Hidden Properties to Attack Node.js ec . . .
|
Feng Xiao |
10:30 - 10:59 |
Room for Escape: Scribbling Outside the Lines of T . . .
|
Alvaro Munoz,Oleksandr Mi . . . |
11:30 - 11:59 |
DNSSECTION: A practical attack on DNSSEC Zone Walk . . .
|
Hadrien Barral,Rémi Gér . . . |
12:30 - 12:59 |
Hacking the Hybrid Cloud
|
Sean Metcalf |
13:30 - 13:59 |
Hacking traffic lights
|
Rik van Duijn,Wesley Neel . . . |
14:30 - 14:59 |
Hacking the Supply Chain – The Ripple20 Vulnerab . . .
|
Ariel Schön,Moshe Kol,Sh . . . |
15:30 - 15:59 |
Demystifying Modern Windows Rootkits
|
Bill Demirkapi |
16:30 - 16:59 |
Domain Fronting is Dead, Long Live Domain Fronting . . .
|
Erik Hunstad |
| | |
Friday |
|
|
09:30 - 09:59 |
Welcome to DEF CON Safe Mode
|
The Dark Tangent |
10:30 - 10:59 |
Spectra—New Wireless Escalation Targets
|
Francesco Gringoli,Jiska . . . |
11:30 - 11:59 |
Pwn2Own Qualcomm compute DSP for fun and profit
|
Slava Makkaveev |
12:30 - 12:59 |
Detecting Fake 4G Base Stations in Real Time
|
Cooper Quintin |
13:30 - 13:59 |
When TLS Hacks You
|
Joshua Maddux |
14:30 - 14:59 |
Finding and Exploiting Bugs in Multiplayer Game En . . .
|
Jack Baker |
15:30 - 15:59 |
Don't Be Silly - It's Only a Lightbulb
|
Eyal Itkin |
16:30 - 16:59 |
Exploiting Key Space Vulnerabilities in the Physic . . .
|
Bill Graydon |
17:30 - 17:59 |
A Hacker’s guide to reducing side-channel attack . . .
|
Elie Bursztein |
18:30 - 18:59 |
Office Drama on macOS
|
Patrick Wardle |
| | |
Saturday |
|
|
09:30 - 09:59 |
A Decade After Stuxnet's Printer Vulnerability: Pr . . .
|
Peleg Hadar,Tomer Bar |
10:30 - 10:59 |
Whispers Among the Stars: Perpetrating (and Preven . . .
|
James Pavur |
11:30 - 11:59 |
Don't Ruck Us Again - The Exploit Returns
|
Gal Zror |
12:30 - 12:59 |
Applied Ca$h Eviction through ATM Exploitation
|
Brenda So,Trey Keown |
13:30 - 13:59 |
How we recovered $XXX,000 in Bitcoin from an encry . . .
|
Michael Stay |
14:30 - 14:59 |
Abusing P2P to Hack 3 Million Cameras: Ain't Nobod . . .
|
Paul Marrapese |
15:30 - 15:59 |
Bypassing Biometric Systems with 3D Printing and E . . .
|
Yamila Levalle |
16:30 - 16:59 |
Reverse Engineering the Tesla Battery Management S . . .
|
Patrick Kiley |
17:30 - 17:59 |
Getting Shells on z/OS with Surrogat Chains
|
Jake Labelle |
20:00 - 21:59 |
Movie Stream - Lost World
|
|
| | |
Sunday |
|
|
09:30 - 09:59 |
Evil Printer: How to Hack Windows Machines with Pr . . .
|
Chuanda Ding,Zhipeng Huo |
10:30 - 10:59 |
Bytes In Disguise
|
Jesse Michael,Mickey Shka . . . |
11:30 - 11:59 |
Only takes a Spark - Popping a shell on a 1000 nod . . .
|
ayoul3 |
14:30 - 14:59 |
Beyond Root: Custom Firmware for Embedded Mobile C . . .
|
Christopher Wade |
15:30 - 15:59 |
Practical VoIP/UC Hacking Using Mr.SIP: SIP-Based . . .
|
Ismail Melih Tas,Kubilay . . . |
16:30 - 16:59 |
Lateral Movement and Privilege Escalation in GCP; . . .
|
Allison Donovan,Dylan Ayr . . . |
17:00 - 17:59 |
Closing Ceremonies
|
The Dark Tangent |
PDT Times |
Title |
speaker |
| | |
Thursday |
|
|
07:30 - 07:59 |
Red Team Village Announcements and Remarks
|
Joseph Mlodzìanowskì (c . . . |
08:00 - 08:59 |
The Bug Hunter’s Methodology
|
Jason Haddix |
09:00 - 08:59 |
Red Team Village CTF - Prequal
|
|
09:15 - 10:15 |
Securing AND Pentesting the Great Spaghetti Monste . . .
|
Kat Fitzgerald |
10:30 - 11:30 |
Guerrilla Red Team: Decentralize the Adversary
|
Christopher Cottrell |
11:45 - 12:45 |
Evil Genius: Why you shouldn't trust that keyboard
|
Farith Perez,Mauro Cáser . . . |
13:00 - 13:59 |
Combining notebooks, datasets, and cloud for the u . . .
|
Ryan Elkins |
14:15 - 15:15 |
Deep Dive into Adversary Emulation - Ransomware Ed . . .
|
Jorge Orchilles |
15:30 - 16:30 |
Introducing DropEngine: A Malleable Payload Creati . . .
|
Gabriel Ryan |
16:45 - 17:45 |
Zero Trust - A Vision for Securing Cloud and Redef . . .
|
Vandana Verma Sehgal |
18:00 - 18:59 |
What college kids always get wrong, the art of att . . .
|
Forrest Fuqua |
19:15 - 20:15 |
Android Malware Adventures
|
Kürşat Oğuzhan Akınc . . . |
20:30 - 21:30 |
Making Breach and Attack Simulation Accessible and . . .
|
Shay Nehmad |
21:45 - 22:45 |
Android Application Exploitation
|
Kyle Benac (aka @B3nac) |
23:00 - 23:59 |
Offensive Embedded Exploitation : Getting hands di . . .
|
Kaustubh Padwad |
| | |
Friday |
|
|
07:30 - 07:59 |
Red Team Village Opening Remarks
|
Joseph Mlodzìanowskì (c . . . |
08:00 - 08:59 |
Knock knock, who's there? Identifying assets in th . . .
|
Tanner Barnes (aka @_Stat . . . |
09:30 - 15:59 |
Red Team Village CTF - Finals
|
|
09:15 - 10:15 |
Red Teaming: Born from the Hacker Community
|
Chris Wysopal |
10:30 - 11:30 |
Panel: The Joy of Coordinating Vulnerability Discl . . .
|
Daniel Gruss,CRob,Lisa Br . . . |
11:45 - 12:45 |
How to hack SWIFT, SPID, and SPEI with basic hacki . . .
|
Guillermo Buendia |
13:00 - 13:59 |
Trust, but Verify: Maintaining Democracy In Spite . . .
|
Allie Mellen |
14:15 - 15:15 |
Grey Hat SSH: SShenanigans
|
Evan Anderson |
15:30 - 16:30 |
Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Auth . . .
|
Justin Hutchens (“Hutch . . . |
16:45 - 17:45 |
Enumerating Cloud File Storage Gems
|
Michael Wylie |
18:00 - 18:59 |
Total E(A)gression
|
Alvaro Folgado Rueda |
19:15 - 20:15 |
Password cracking beyond 15 characters and under $ . . .
|
Travis Palmer |
20:30 - 21:30 |
50 Shades of Sudo Abuse
|
Tyler Boykin |
21:45 - 22:45 |
ATTPwn: Adversarial Emulation and Offensive Techni . . .
|
Fran Ramirez,Pablo Gonzal . . . |
23:00 - 23:59 |
ERPwnage - a red team approach to targeting SAP
|
Austin Marck |
| | |
Saturday |
|
|
01:00 - 01:59 |
Back to the future: Computer science and systems b . . .
|
Dr Lorenz Adlung,Noa Novo . . . |
02:15 - 03:15 |
Modern Red Team Tradecraft - Informing Defenders b . . .
|
Sajal Thomas |
03:30 - 04:30 |
Executing Red Team Scenarios with Built-in Scenari . . .
|
Erdener Uyan,Gökberk Gü . . . |
04:45 - 05:45 |
OU having a laugh?
|
Petros Koutroumpis |
06:00 - 06:59 |
All of the threats: Intelligence, modelling and hu . . .
|
Tim Wadhwa-Brown |
07:15 - 08:15 |
Catch Me if You Can
|
Eduardo Arriols |
08:30 - 09:30 |
Mechanizing the Methodology: Automating Discovery, . . .
|
Daniel Miessler |
09:45 - 10:45 |
Y'all Tryna Bypass Python 3.8 Audit Hooks or Nah?
|
Leron Gray |
11:00 - 11:59 |
Initial Compromise through Web Side
|
Walter Cuestas |
12:15 - 12:30 |
Inside the Mind of a Threat Actor: Beyond Pentesti . . .
|
Phillip Wylie |
12:45 - 13:45 |
The Student Roadmap to Becoming A Penetration Test . . .
|
Jonathan Helmus |
14:15 - 14:59 |
The Art of Balancing: A Burnout Talk
|
Chloé Messdaghi |
15:15 - 16:15 |
APTs <3 PowerShell and Why You Should Too
|
Anthony Rose,Jake “Hubb . . . |
16:30 - 17:30 |
Indicators of Emulation: Extra Spicy Adversary Emu . . .
|
Ch33r10,haydnjohnson |
17:45 - 18:45 |
Emulating an Adversary with Imperfect Intelligence
|
Adam Pennington |
19:00 - 19:59 |
Automating Threat Hunting on the Dark Web and othe . . .
|
Apurv Singh Gautam |
20:15 - 21:15 |
Bypassing in Mobile Network From Red-Team Points o . . .
|
Ali Abdollahi |
21:30 - 22:30 |
Sounds Legit: Why you shouldn't trust that speaker
|
Luis Ángel Ramírez Mend . . . |
22:45 - 23:59 |
Weaponized XSS - Moving Beyond Alert(1)
|
Ray Doyle |
| | |
Sunday |
|
|
01:00 - 01:59 |
PatrOwl - Red flavour of SOC automation
|
Nicolas MATTIOCCO |
02:15 - 03:15 |
Reviewing MS08-067, Illustration Of An Old Chapter
|
Etizaz Mohsin |
03:30 - 04:30 |
RedTeamOps - Managing Red Team Infrastructure as a . . .
|
Mert Can Coşkuner |
04:45 - 05:45 |
From Discovery to Disclosure
|
Ibad Shah |
06:00 - 06:59 |
Hacking Zoom: a Hacker's Journey into Zoom Securit . . .
|
Mazin Ahmed |
07:15 - 08:15 |
PWN The World
|
Chris Kubecka |
08:30 - 09:30 |
Autonomous Security Analysis and Penetration Testi . . .
|
Ankur Chowdhary |
09:45 - 10:45 |
Kubernetes Goat - Vulnerable by Design Kubernetes . . .
|
Madhu Akula |
11:00 - 11:59 |
Breaking the Attack Chain
|
Corey Ham,Matt Eidelberg |
12:15 - 13:15 |
Hashes; Smothered, Covered, and Scattered: Modern . . .
|
Lee Wangenheim |
13:30 - 14:30 |
You're Adversary Within - The Golden Age of Inside . . .
|
Adam Mashinchi |
15:00 - 15:59 |
Have my keys been pwned? - API Edition
|
José Hernandez,Rod Soto |
16:00 - 16:59 |
Red Team Village Closing Ceremony and Announcement . . .
|
Joseph Mlodzìanowskì (c . . . |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 10:30 |
Welcome and Kick-Off
|
Harri Hursti,Matt Blaze,M . . . |
10:30 - 10:59 |
Keynote Remarks: Representative Jackie Speier
|
Jackie Speier |
11:00 - 11:30 |
A Policy Approach to Resolving Cybersecurity Probl . . .
|
Jody Westby |
11:30 - 12:30 |
Hacking Democracy II: On Securing an Election Unde . . .
|
Casey John Ellis,Kimber D . . . |
12:30 - 12:59 |
See Something, Say Something
|
Marten Mickos |
13:00 - 13:59 |
A Panel with the Feds on Election Security
|
Bryson Bort,David Imbordi . . . |
14:00 - 14:30 |
Keynote Remarks: Senator Ron Wyden
|
Ron Wyden |
14:30 - 14:59 |
Chairman Benjamin Hovland, US Election Assistance . . .
|
Benjamin Hovland |
15:00 - 15:30 |
Secretary Kim Wyman, Washington
|
Kim Wyman |
20:00 - 20:59 |
Live Q&A with Special Guests Regarding "Kill Chain . . .
|
|
| | |
Saturday |
|
|
10:00 - 10:30 |
War By Other Means: How Influence Operations Under . . .
|
Ben Dubow |
10:30 - 10:59 |
John Odum, Montpelier, VT
|
John Odum |
11:00 - 11:30 |
Heightened Election Security Risks Admist the Pand . . .
|
Jack Cable,Alex Zaheer |
11:30 - 11:59 |
Hack-a-Fax
|
Forrest Senti,Mattie Gull . . . |
12:00 - 12:30 |
Analysis of the Attack Data Collected During Mobil . . .
|
Nimit Sawhney,Nailah Mims |
12:30 - 12:59 |
Remote Online Balloting Delivery and Marking Optio . . .
|
Susan Greenhalgh,Steve Ne . . . |
13:00 - 13:30 |
Don’t Go Postal Over Mail In Voting
|
Bianca Lewis |
13:30 - 13:59 |
The Ballot is Busted Before the Blockchain: A Secu . . .
|
Michael A. Specter |
14:00 - 14:30 |
Vote-from-home? Review of Election Security on Rem . . .
|
Sang-Oun Lee |
14:30 - 14:59 |
Electronic Ballot Return Standards & Guidelines
|
Forrest Senti,Mattie Gull . . . |
15:30 - 15:59 |
A Lawyer's Reflections on Elections
|
Cordero Alexander Delgadi . . . |
15:00 - 15:30 |
Understanding Cyber-Attacks and Their Implications . . .
|
Javier F. Patiño García |
16:00 - 16:30 |
Protecting Elections with Data Science -- A Tool f . . .
|
Stephanie Singer |